1/134
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Software development
Another name for programming.
Pseudocode
An outline of the logic of the program to be written.
Selection
Logic structure, also known as IF-THEN-ELSE, that controls program flow based on a decision.
high level
Programming languages that are closer to the language of humans.
Debugging
The process of testing and then eliminating program errors.
Documentation
Program step that involves creating descriptions and procedures about a program and how to use it.
Machine
The first-generation language consisting of 1s and 0s.
Interpreter
Converts a procedural language one statement at a time into machine code just before it is to be executed.
5GL
Generation of computer languages that allows a person to provide a system with a problem and some constraints, and then request a solution.
Natural Langauge
5GL that allows more direct human communication with a program.
Sequential
The programming logic structure in which one program statement follows another.
Object code
A compiler converts the programmer’s procedural language program, called the source code, into a machine language code, called the _________.
Query
These 4GL languages enable nonprogrammers to use certain easily understood commands to search and generate reports from a database.
Program maintenance
This step in the six-step programming procedure is the final step.
Data
What a program processes.
Modules
The major processing steps identified in a top-down program design.
Object-oriented
Unlike traditional systems development, this software development approach focuses less on the procedures and more on defining the relationships between previously defined procedures.
high-level language
Natural languages are considered to be a(n) _________.
Structured programs
One of the best ways to code effective programs is to use the three basic logic structures to create _________.
Program test
This step in the six-step programming procedure involves desk checking and searching for syntax and logic errors.
Software implementation
This is examined and improved through systems analysis.
Analysis
Systems life cycle phase that studies the present system in depth.
Solutions
Systems analysis involves suggesting alternative _____.
Maintenance
The last and ongoing phase of the systems life cycle is systems _____.
Organization chart
The document that shows the levels of management and formal lines of authority is a(n) _____.
Conversion
Another name for systems implementation.
Direct
The four approaches to conversion are parallel, pilot, phased, and _____.
Phased
The approach in which the new system is implemented gradually over a period of time.
Grid chart
This systems analysis tool shows the relationship between input and output documents.
System implementation
This phase involves installing the new system and training people.
Pilot
This approach to conversion begins by trying out a new system in only one part of an organization.
CASE
These tools relieve the systems analysts of many repetitive tasks; develop clear documentation; and, for larger projects, coordinate team member activities.
System design
This phase concludes with a report that considers alternative system designs and recommends the best system.
Data
An information system is a collection of hardware, software, people, procedures, the Internet, and ________.
Preliminary investigation
The first phase in the systems life cycle.
RAD
An alternative to the systems life cycle approach using powerful development software, small specialized teams, and highly trained personnel.
System analysis
This phase is concerned about determining system requirements, not with design.
Operational
This type of feasibility evaluates whether the people within the organization will embrace or resist a new system.
Physical
View that focuses on the actual format and location of the data.
Field
A group of related characters is a _______.
Batch
Type of processing in which data is collected over several hours, days, or even weeks and then processed all at once.
Less data redundancy
What is the advantage of an organization using a database instead of allowing individual departments to create and maintain their own data?
Schema
Another name for a data dictionary is ______.
Hierarchical
Type of database structure where fields or records are structured in nodes that are connected like the branches of an upside-down tree.
Relational
Type of database structure where the data elements are stored in different tables.
Speed
One advantage of a multidimensional database is its ability to improve processing _____.
Attributes
Object-oriented databases organize data by classes, objects, methods, and _____.
Distributed
Type of database that uses communication networks to link data stored in different locations.
Data cube
Another name for a multidimensional database
Objects
Object-oriented databases organize data by classes, attributes, methods, and _______.
key field
The distinctive field(s) found in each record in a database.
Data
This is defined as the facts or observations about people, places, things, and events.
Pointer
The connection between parent and child nodes.
many-to-many relationship
A network database where each child node may have more than one parent node.
Security
This advantage of using databases is achieved by restricting database access to only the information needed by the user.
DBMS engine
The bridge between the logical and physical views of the data.
Character
This is the most basic logical data element such as a single letter, number, or special character.
Database administrators
Highly trained computer specialists who interact with the data administration subsystem.
Processing
The accounting activity that records the customer requests for the company’s products or services is sales order _____.
Payroll
The accounting activity concerned with calculating employee paychecks is ______.
Standardized
MIS produces this type of report.
Marketing
This function plans, prices, promotes, sells, and distributes the organization’s goods and services.
Middle-level
Select a managerial level where information flow is vertical and horizontal.
Data
Type of worker who is involved with the distribution and communication of information.
Videoconferencing
Computer system that allows people located at various geographic locations to communicate and have in-person meetings.
MIS
A computer-based information system that uses data from TPS to support middle-level managers.
Exception
A type of report that calls attention to unusual events.
System
Type of software that works behind the scenes to handle detailed operating procedures.
Received
Accounts payable refers to money the company owes its suppliers for materials and services it has _________.
General Ledger
This accounting activity keeps track of all summaries of all transactions.
Top
This managerial level has information flow that is vertical, horizontal, and external.
Information
The type of worker involved with the distribution, communication, and creation of information.
Project managers
The type of program designed to schedule, plan, and control project resources.
Balance sheet
This accounting statement lists the overall financial condition of an organization.
Periodic
A type of report produced at regular intervals.
Accounting
This basic organizational function records all financial activity from billing customers to paying employees.
Accuracy
Privacy concern that relates to the responsibility to ensure correct data collection.
Information brokers
Individuals who collect and sell personal data.
Cookies
Small data files deposited on your hard disk from websites you have visited.
Spyware
Wide range of programs that secretly record and report an individual’s activities on the Internet.
Malware
Malicious programs that damage or disrupt a computer system.
Zombies
Infected computers that can be remotely controlled.
Phising
Used by scammers to trick Internet users with official-looking websites.
Biometric
A type of scanning device such as fingerprint and iris (eye) scanner.
Encryption
Process of coding information to make it unreadable except to those who have a key.
Plagerism
An ethical issue relating to using another person’s work and ideas as your own without giving credit to the original source.
Firewall
Special hardware and software used to control access to a corporation’s private network is known as a(n) ________.
Online identity
The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their ________.
History file
Browsers store the locations of sites visited in a ________.
Privacy
The browser mode that ensures your browsing activity is not recorded.
Profiles
Highly detailed and personalized descriptions of individuals are electronic ________.
DRM
To prevent copyright violations, corporations often use ________.
Cyberbullying
The use of the Internet to send or post content intended to hurt or embarrass another person is known as ________.
Crackers
Computer criminals who create and distribute malicious programs.
Trojan horses
Programs that come into a computer system disguised as something else are called ________.
Access
The three primary privacy issues are accuracy, property, and ________.
BUS
Type of network topology in which each device is connected to a common cable called a backbone.
TCP/IP
A widely used Internet protocolUses high-frequency radio waves.
WiFi
Uses high-frequency radio waves.
Analog
Signals that are continuous electronic waves.