CTA chapter 7-13 final

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/134

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

135 Terms

1
New cards

Software development

Another name for programming.

2
New cards

Pseudocode

An outline of the logic of the program to be written.

3
New cards

Selection

Logic structure, also known as IF-THEN-ELSE, that controls program flow based on a decision.

4
New cards

high level

Programming languages that are closer to the language of humans.

5
New cards

Debugging

The process of testing and then eliminating program errors.

6
New cards

Documentation

Program step that involves creating descriptions and procedures about a program and how to use it.

7
New cards

Machine

The first-generation language consisting of 1s and 0s.

8
New cards

Interpreter

Converts a procedural language one statement at a time into machine code just before it is to be executed.

9
New cards

5GL

Generation of computer languages that allows a person to provide a system with a problem and some constraints, and then request a solution.

10
New cards

Natural Langauge

5GL that allows more direct human communication with a program.

11
New cards

Sequential

The programming logic structure in which one program statement follows another.

12
New cards

Object code

A compiler converts the programmer’s procedural language program, called the source code, into a machine language code, called the _________.

13
New cards

Query

These 4GL languages enable nonprogrammers to use certain easily understood commands to search and generate reports from a database.

14
New cards

Program maintenance

This step in the six-step programming procedure is the final step.

15
New cards

Data

What a program processes.

16
New cards

Modules

The major processing steps identified in a top-down program design.

17
New cards

Object-oriented

Unlike traditional systems development, this software development approach focuses less on the procedures and more on defining the relationships between previously defined procedures.

18
New cards

high-level language

Natural languages are considered to be a(n) _________.

19
New cards

Structured programs

One of the best ways to code effective programs is to use the three basic logic structures to create _________.

20
New cards

Program test

This step in the six-step programming procedure involves desk checking and searching for syntax and logic errors.

21
New cards

Software implementation

This is examined and improved through systems analysis.

22
New cards

Analysis

Systems life cycle phase that studies the present system in depth.

23
New cards

Solutions

Systems analysis involves suggesting alternative _____.

24
New cards

Maintenance

The last and ongoing phase of the systems life cycle is systems _____.

25
New cards

Organization chart

The document that shows the levels of management and formal lines of authority is a(n) _____.

26
New cards

Conversion

Another name for systems implementation.

27
New cards

Direct

The four approaches to conversion are parallel, pilot, phased, and _____.

28
New cards

Phased

The approach in which the new system is implemented gradually over a period of time.

29
New cards

Grid chart

This systems analysis tool shows the relationship between input and output documents.

30
New cards

System implementation

This phase involves installing the new system and training people.

31
New cards

Pilot

This approach to conversion begins by trying out a new system in only one part of an organization.

32
New cards

CASE

These tools relieve the systems analysts of many repetitive tasks; develop clear documentation; and, for larger projects, coordinate team member activities.

33
New cards

System design

This phase concludes with a report that considers alternative system designs and recommends the best system.

34
New cards

Data

An information system is a collection of hardware, software, people, procedures, the Internet, and ________.

35
New cards

Preliminary investigation

The first phase in the systems life cycle.

36
New cards

RAD

An alternative to the systems life cycle approach using powerful development software, small specialized teams, and highly trained personnel.

37
New cards

System analysis

This phase is concerned about determining system requirements, not with design.

38
New cards

Operational

This type of feasibility evaluates whether the people within the organization will embrace or resist a new system.

39
New cards

Physical

View that focuses on the actual format and location of the data.

40
New cards

Field

A group of related characters is a _______.

41
New cards

Batch

Type of processing in which data is collected over several hours, days, or even weeks and then processed all at once.

42
New cards

Less data redundancy

What is the advantage of an organization using a database instead of allowing individual departments to create and maintain their own data?

43
New cards

Schema

Another name for a data dictionary is ______.

44
New cards

Hierarchical

Type of database structure where fields or records are structured in nodes that are connected like the branches of an upside-down tree.

45
New cards

Relational

Type of database structure where the data elements are stored in different tables.

46
New cards

Speed

One advantage of a multidimensional database is its ability to improve processing _____.

47
New cards

Attributes

Object-oriented databases organize data by classes, objects, methods, and _____.

48
New cards

Distributed

Type of database that uses communication networks to link data stored in different locations.

49
New cards

Data cube

Another name for a multidimensional database

50
New cards

Objects

Object-oriented databases organize data by classes, attributes, methods, and _______.

51
New cards

key field

The distinctive field(s) found in each record in a database.

52
New cards

Data

This is defined as the facts or observations about people, places, things, and events.

53
New cards

Pointer

The connection between parent and child nodes.

54
New cards

many-to-many relationship

A network database where each child node may have more than one parent node.

55
New cards

Security

This advantage of using databases is achieved by restricting database access to only the information needed by the user.

56
New cards

DBMS engine

The bridge between the logical and physical views of the data.

57
New cards

Character

This is the most basic logical data element such as a single letter, number, or special character.

58
New cards

Database administrators

Highly trained computer specialists who interact with the data administration subsystem.

59
New cards

Processing

The accounting activity that records the customer requests for the company’s products or services is sales order _____.

60
New cards

Payroll

The accounting activity concerned with calculating employee paychecks is ______.

61
New cards

Standardized

MIS produces this type of report.

62
New cards

Marketing

This function plans, prices, promotes, sells, and distributes the organization’s goods and services.

63
New cards

Middle-level

Select a managerial level where information flow is vertical and horizontal.

64
New cards

Data

Type of worker who is involved with the distribution and communication of information.

65
New cards

Videoconferencing

Computer system that allows people located at various geographic locations to communicate and have in-person meetings.

66
New cards

MIS

A computer-based information system that uses data from TPS to support middle-level managers.

67
New cards

Exception

A type of report that calls attention to unusual events.

68
New cards

System

Type of software that works behind the scenes to handle detailed operating procedures.

69
New cards

Received

Accounts payable refers to money the company owes its suppliers for materials and services it has _________.

70
New cards

General Ledger

This accounting activity keeps track of all summaries of all transactions.

71
New cards

Top

This managerial level has information flow that is vertical, horizontal, and external.

72
New cards

Information

The type of worker involved with the distribution, communication, and creation of information.

73
New cards

Project managers

The type of program designed to schedule, plan, and control project resources.

74
New cards

Balance sheet

This accounting statement lists the overall financial condition of an organization.

75
New cards

Periodic

A type of report produced at regular intervals.

76
New cards

Accounting

This basic organizational function records all financial activity from billing customers to paying employees.

77
New cards

Accuracy

Privacy concern that relates to the responsibility to ensure correct data collection.

78
New cards

Information brokers

Individuals who collect and sell personal data.

79
New cards

Cookies

Small data files deposited on your hard disk from websites you have visited.

80
New cards

Spyware

Wide range of programs that secretly record and report an individual’s activities on the Internet.

81
New cards

Malware

Malicious programs that damage or disrupt a computer system.

82
New cards

Zombies

Infected computers that can be remotely controlled.

83
New cards

Phising

Used by scammers to trick Internet users with official-looking websites.

84
New cards

Biometric

A type of scanning device such as fingerprint and iris (eye) scanner.

85
New cards

Encryption

Process of coding information to make it unreadable except to those who have a key.

86
New cards

Plagerism

An ethical issue relating to using another person’s work and ideas as your own without giving credit to the original source.

87
New cards

Firewall

Special hardware and software used to control access to a corporation’s private network is known as a(n) ________.

88
New cards

Online identity

The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their ________.

89
New cards

History file

Browsers store the locations of sites visited in a ________.

90
New cards

Privacy

The browser mode that ensures your browsing activity is not recorded.

91
New cards

Profiles

Highly detailed and personalized descriptions of individuals are electronic ________.

92
New cards

DRM

To prevent copyright violations, corporations often use ________.

93
New cards

Cyberbullying

The use of the Internet to send or post content intended to hurt or embarrass another person is known as ________.

94
New cards

Crackers

Computer criminals who create and distribute malicious programs.

95
New cards

Trojan horses

Programs that come into a computer system disguised as something else are called ________.

96
New cards

Access

The three primary privacy issues are accuracy, property, and ________.

97
New cards

BUS

Type of network topology in which each device is connected to a common cable called a backbone.

98
New cards

TCP/IP

A widely used Internet protocolUses high-frequency radio waves.

99
New cards

WiFi

Uses high-frequency radio waves.

100
New cards

Analog

Signals that are continuous electronic waves.