CIS

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/143

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

144 Terms

1
New cards

Artificial Intelligence

Branch of computer science that focuses on creating computer systems or computer-controlled machines that have an ability to perform tasks associated with human intelligence

2
New cards

Knowledge Representation

Encoding information about the world into formats that the AI system can understand

3
New cards

Unsupervised Learning

When a system can look at data on its own and build rules for deciding what its seeing

4
New cards

Digital Divide

The gap in access to technology and the internet access across different regions

5
New cards

Machine Learning

AI systems are allowed to learn from data patterns without explicit programming

6
New cards

Embodied Agents

Robots that mimic human appearance and actions

7
New cards

Personal Ethics

The set of formal or informal ethical principles you use to make decisions

8
New cards

Predictive Policing

The use of advanced technologies and data analysis to forecast where crimes are likely to happen or who might be involved in criminal activity

9
New cards

Hard Drive

The computer’s primary device for permanent storage of software and documents(nonvolatile)

10
New cards

External Hard Drive

A hard drive made portable, mostly used to back up data on your internal hard drive

11
New cards

Micro SD Flash Cards

Tiny removable memory cards that let you expand storage capacity on certain phones

12
New cards

High-definition Multimedia Interface Port

A compact audio-video interface that carries both high-definition video and uncompressed digital audio on one cable

13
New cards

B2B

Refers to transactions that take place between businesses

14
New cards

C2C

Transactions that take place between consumers

15
New cards

B2C

Business to consumer

16
New cards

E-commerce

The process of conducting business online through advertising and selling products

17
New cards

Social Commerce

Using social networks to assist in marketing and purchasing products

18
New cards

Internet Protocol

A universal translator between devices. Data is broken into packets for transmission and reassembled at their destination into the original message

19
New cards

The Web

A subset of the Internet. It’s designed to host and access HTML pages. Users can navigate through websites, accessing information stored on servers worldwide

20
New cards

Deepfake

A highly realistic digital video or image generated using artificial intelligence

21
New cards

IP Address

A unique set of numbers assigned to each device connected to a network. It helps identify and locate devices so they can communicate with each other online

22
New cards

Beta Version

An application that is still under development

23
New cards

Open Source Software

Free software that is available with few licensing and copyright restrictions. A community of users continues to make changes to the software, keeping it current

24
New cards

Freeware

Copyrighted software that you can use for free

25
New cards

Software

Manages processes, runs applications, and enables user interaction with the system. It provides instructions that tell the computer’s hardware what tasks to perform and how to execute them

26
New cards

Proprietary Software

Created for profit and sold to users with specific terms of use. Restricted access to its source code

27
New cards

System Requirements

Minimum standards for the operating system, processor, RAM, and storage

28
New cards

Software License

Upon purchase, the license grants the user permission to use the software under specific conditions outline in the End User License Agreement

29
New cards

Binary Language

The simplest form of data representation utilizing only two states. 0 and 1. Inside a computer’s electrical switches flip between these two states

30
New cards

File Management

Providing an organizational structure to the computer’s components

31
New cards

Extension

Identifies what kind of family the file belongs to or which application should be used to read the file

32
New cards

Folder

A collection of files stored on a computer

33
New cards

Root Directory

The C drive, which is at the top of the filing structure of the computer system

34
New cards

Paging

Swapping data and instructions between RAM and the hard drive’s swap file

35
New cards

Arithmetic Logic Unit

Performs all calculations and makes logic and comparison decisions for the computer

36
New cards

Random Access Storage(RAM)

Your computer’s temporary storage space. Data stored in RAM is volatile

37
New cards

The operating system

Coordinates the flow of data and information within a computer system. It manages hardware resources, facilitates user interaction, and provides a platform for running applications

38
New cards

Graphical User Interface

Provides graphics, icons, and menus to allow users to interact with the system

39
New cards

Preemptive Multi-tasking

The OS manages multiple tasks by prioritizing them based on interrupts. The OS can interrupt a currently running task to allocate CPU time to a higher-priority task

40
New cards

Virtual Memory

When the physical RAM is full, the OS temporarily moves data to a reserved space on the hard drive, using a portion of the hard drive as additional memory

41
New cards

Boot Process

When you turn on your computer the BP loads the operating system into the RAM. The CPU wakes up the BIOS which performs a POST to ensure all hardware is running correctly

42
New cards

File Extension

Indicates the file’s format and type. This helps the operating system determine which application should be used to open or execute the file

43
New cards

Cloud Storage

Your files are accessible from any internet-connected device

44
New cards

Utility Programs

Software designed to help manage, maintain, and protect your computer

45
New cards

Mesh Network

A system of composed multiple mesh nodes that work together as one large Wi-Fi system. They communicate with each other to share a wireless connection

46
New cards

Service Set Identifier(SSID)

A network name that wireless routers use to identify themselves

47
New cards

Network

Enables communication between different devices, allowing them to exchange data and access shared resources

48
New cards

Data Transfer Rate

The maximum speed at which data can be transmitted over a network or communication channel

49
New cards

Throughput

The actual speed achieved during data transmission

50
New cards

Personal Area Network(PAN)

A network for devices close to one person

51
New cards

Local Area Network(LAN)

A network within a small geographical area

52
New cards

Home Area Network(HAN)

A specific type of LAN located in a home

53
New cards

Metropolitan Area Network(MAN)

A large network providing access to a specific geographical area(city)

54
New cards

Wide Area Network(WAN)

A network spanning a large physical distance

55
New cards

Peer to Peer(P2P)

Each node functions as both a client and a server, allowing direct sharing of resources without the need for a centralized server

56
New cards

Client/Server Network

A server provides resources and administration to client computers

57
New cards

Switch

A network component that directs data packets to their intended destinations within a local network

58
New cards

Router

Transfers packets of data between networks

59
New cards

Network Attached Storage(NAS)

Device offers centralized data storage and access. They store data in a single location

60
New cards

Electronic Ink

Composed of millions of micro capsules with white and black particles in a clear fluid representing text

61
New cards

Identity Theft

When a thief steals your personal information and poses as you in financial or legal transactions

62
New cards

Black-hat Hackers

Breaks into system to destroy information or for illegal gain

63
New cards

White-hat Hackers

Breaks into systems for non malicious reasons, often trying to embarrass a company into fixing a problem

64
New cards

Packet Sniffer

A program that examines each packet and can read its contents

65
New cards

Scripts

Small programs that are executed without your knowledge when you enter a site

66
New cards

Stealth Virus

Temporarily erases its code from the files where they reside and hide in the active memory of the computer

67
New cards

Polymorphic Virus

Changes its own code and periodically rewrites itself to avoid detection

68
New cards

Multipartide

Designed to infect multiple files in an effort to fool the anti-virus software

69
New cards

Worms

Travel between systems through network connections to spread their infection. Worms can run independently of host file execution

70
New cards

Adware

Software that displays sponsored advertisements in a section of your browser window or as a pop-up box

71
New cards

Spyware

An unwanted piggyback program that runs in the background of your system and transmits information about you to the owner of the program so it can be used for marketing purposes

72
New cards

Pharming

Malicious code alters your browser’s ability to find web addresses. Users are directed to bogus websites who are set up with the purpose of gathering information

73
New cards

Programming

The process of translating a task into a series of commands a computer will use to perform that task

74
New cards

Testing Plan

Lists specific input numbers the program would typically expect the user to enter and the output values that a perfect program will return for those input values

75
New cards

Algorithm

A set of specific sequential steps that describe in natural language exactly what the computer program must do to complete its task

76
New cards

Decision Point

The program must choose from different actions based on the value of its current inputs

77
New cards

Binary Decision

They can only be answered in one of only two ways

78
New cards

Pseudocode

A text based approach to documenting an algorithm, describing the actions that the algorithm will take

79
New cards

Coding

Translating an algorithm into a programming language

80
New cards

Programming Language

A kind of code for the set of instruction the CPU knows how to perform

81
New cards

Compilation

The process by which code is converted into machine language

82
New cards

Interpreter

Translates the source code line by line and executes each line as it is translated

83
New cards

Integrated Development Environment(IDE)

A developmental tool that helps programmers write, compile, and test their programs

84
New cards

Code Editing

The step in which programmers type the code into the computer

85
New cards

Debugging

Running the program over and over to find errors

86
New cards

Information System

Data, people, and procedures, and softwares that help in planning and decision making

87
New cards

System Development Life Cycle

Problem Opportunity / Identification | Analysis, Design, Development | Testing and Installation | Maintenance and Evolution

88
New cards

Program Development Life Cycle

Problem statement | algorithm development | coding and debugging | testing and documentation

89
New cards

Control Structures

Keywords in programming language that allow the programmer to direct the flow of the program based on a decision

90
New cards

Compiler

A program that understands both the syntax of the programming language and the exact structure of the CPU and its machine language, it can read source code

91
New cards

Application Programming Interface

The set of specific commands that a given server will respond to

92
New cards

Architecture-Neutral

JAVA code only needs to be compiled once, after which it can be run on many CPUs

93
New cards

Scripting Language

A simple programming language that’s limited to performing a set of specialized tasks

94
New cards

eXtensible Markup Language

Enables designers to define their own data-based tags, making it much easier for a program running on server computers to transfer the key information on its page to another site

95
New cards

Clickstream Data

Software used on company websites to capture information about each click that users make as they navigate through the site

96
New cards

Transaction-Processing System(TPS)

An operational level system that keeps track of everyday business transactions or order tracking/processing, payroll, and cash management

97
New cards

Enterprise Resource Planning

Accumulates information from multiple departments that are relevant to running a business

98
New cards

Data mart

Small slices of a data warehouse grouped together and separated from the main body of data in the warehouse so that related sets of data can be analyzed

99
New cards

Data Warehouse

A large scale collection of data that contains and organizes in one place all the data from an organization’s databases

100
New cards

Database

A collection of related data that can be stored, sorted, organized, and queried