You are on page 1of 78

lOMoARcPSD

lOMoARcPSD

Summary - Chapter 1-12 Terms


Computer Concepts for End Users (University of
Windsor)

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Chapter 1
Section A: All Things Digital
Information Age: period in history when information is easy to access
and affects many aspects of everyday life from the economy to politics
and social relationships
Digital Revolution: ongoing process of social, political, and economic
change brought about by digital technology such as computers and the
Internet based on digital electronics and the idea that electrical
signals can represent data such as numbers, words, pictures, music,
etc.
Digitization: process of converting text, numbers, sound, photos, and
video data that can be processed by digital devices
Digital Revolution 4 Phases: expired tired uninspired
desired
Data Processing: based on the cycle of: input-processing-output
(data goes into a computer, it is processed, and then it is outputted)
Personal Computing: characterized by small, standalone computers
powered by local software
Local Software: any software that is installed on a computers hard
drive
Computer network: group of computers linked together to share data
and resources
Internet: global computer network originally developed as a military
project (access to the Internet was a major factor contributing to the
upswing of computer sales)
Web (World Wide Web): collection of links, documents, graphics, and
sounds that can be accessed over the Internet
Cloud Computing: provides access to information, applications,
communications, and storage over the Internet; before cloud

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

computing, the computer typically ran software based locally the


cloud gets its name from a diagram to show the Internet based
applications on computers
Convergence: process by which several technologies with distinct
functions evolve to form a single document important to the digital
revolution because it created sophisticated mobile devices whose
owners demand access to the same services available from full sized
computed on their desks
Social Media: cloud based applications designed for social
interactions and consumer-generated content
Anonymizer Tools: Internet sites/tools that cloak a persons identity
Intellectual Property: ownership of certain types of information,
ideas, or representations including patented, trademarked, and
copyrighted material
Pirating: illegal copying and distribution of copyrighted material
Open Source: projects that promote copying, free distribution, peer
review, and user modification (example is Linux)
Globalization: worldwide economic interdependence of countries that
occurs as cross-border commerce increases and as money flows more
freely among countries
Digital Divide: term that refers to the gap between people who have
access to technology and those who do not

Section B: Digital Devices


Computer: multipurpose device that accepts input, processes data,
stores data, and produces output all according to a series of store
instructions
Computer Input: whatever is typed, submitted, or transmitted to a
computer system either supplied by the person, the environment, or by
another computer

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Input Device: something like a keyboard or mouse that gathers data


and transforms it into a series of electronic signals for the computer to
store and manipulate
Computer Output: result produced by a computer
Output Devices: display, print, or transmit the results of processing
Data: symbols that represent facts, objects, and ideas
Data Processing: manipulation of data
Central Processing Unit (CPU): where most data processing takes
place; in most modern computers, it is a microprocessor which is an
electronic component that can be programmed to perform tasks based
on data it receives
Memory: area of a computer that temporarily holds data waiting to be
processed, stored, or output
Storage: area where data can be left on a permanent basis when it is
not immediately needed for processing
Computer File: a named collection of data that exists on a storage
medium, such as a hard disk, CD, DVD, flash drive, etc.
Computer Program: series of instructions that tells a computer how
to carryout processing tasks
Software: programs form the software that sets up a computer to do a
specific task
Stored Program: means that a series of instructions for a computing
task can be loaded into a computers memory
Application Software: set of computer programs that help a person
carry out a task (sometimes referred to as apps)
System Software: help the computer system monitor itself in order to
function efficiency (example is the operating system)
Operating System (OS): the master controller for all the activities
that take place within a computer

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Personal Computer: microprocessor based computing device


designed to meet the computing needs of an individual usually
including a keyboard and screen providing access to a wide variety of
local and cloud based applications
Workstation: 1/ personal computer that is connected to a network, 2/
powerful desktop computers used for high performance tasks that
require lots of processing speed
Videogame Console: this is not a personal computer because of its
history as a dedicated game device
Server: serves computers on a network by supplying them with data
Client: any software or digital device that requests data from a server
Download: the process of copying a file from a server to your own
client computer
Upload: process of copying files from your client computer to a server
Mainframe Computer: large and expensive computer capable of
simultaneously processing data for hundreds or thousands of users;
generally used by businesses or governments to provide clients
storage, processing, and management of large amounts of data
Supercomputer: at the time of construction, it is the fastest computer
in the world; can tackle tasks and compute intensive problems that just
would not be practical for other computers; common uses include
breaking codes, modeling worldwide weather systems, simulating
nuclear explosions, etc.
Compute-Intensive Problem: requires massive amounts of data to
be processed using complex mathematics calculators
Hand Held Computers: handheld device that allows you to install
applications; three types include: enhanced media players,
smartphones, tablets
Microcontroller: a special purpose microprocessor that is built into
the machine it controls; sometimes called a computer-on-a-chip or an
embedded computer because it includes many of the elements
common to computers; can be embedded in all sorts of everyday

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

devices, enabling machines to perform sophisticated tasks that require


awareness and feedback from the environment

Section C: Digital Data Representation


Data: the symbols that represent people, events, things, and ideas;
can be a name, number, colors in a photograph, musical notes, etc.
Data vs. Information: data is used by machines, information is used
by humans
Data Representation: the form in which data is stored, processed,
and transmitted; can be represented using digital or analog methods
Analog Data: represented using an infinite scale of values
Digital Data: is text, numbers, graphics, sound, video that have been
converted into discrete digits such as 0s and 1s (these are binary
digits)
Bit: is a 0 or 1 used in the digital representation of data
Numeric Data: consists of numbers that can be used in arithmetic
operations
Binary Number System: has only two digits: 0 and 1
Character Data: composed of letters, symbols, and numerals that are
not used in the arithmetic operations
ASCII (American Standard Code for Information Exchange):
requires only seven bits for each character; provides codes for 128
characters including uppercase letters, lower case letters, punctuation
symbols, and numerals
Extended ASCII: uses eight bits to represent each character; provides
codes for 256 characters including other graphic symbols
EBCDIC (Extended Binary Coded Decimal Interchange Code): an
alternative to the 8-bit Extended ASCII Code and is usually used only
by older IBM mainframe computers

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Unicode: uses sixteen bits and provides codes for 65,000 characters
(bonus for representing the alphabets of multiple languages)
Byte: a collection of eight bits usually abbreviated as an uppercase B
Kilobit: is abbreviated as Kb and is 1,024 bits
Kilobyte: is abbreviated as KB and is 1,024 bytes
Megabit: is abbreviate as Mb and is 1,048,576 bits
Megabyte: is abbreviated as MB and is 1,048,576 bytes
Gigabit: is abbreviated as Gb and is approximately 1 billion bits
Gigabytes: is abbreviated as GB and is approximately 1 billion bytes
Integrated Circuit: super thin slice of semiconducting material
packed with microscopic circuit elements such as wires, transistors,
capacitors, logic gates, and resistors
Semiconducting materials: substances with properties between
those of a conductor and an insulator such as silicon and germanium
DIP (Dual In-Line Packages): have two rows of pins that connect the
IC circuitry to a circuit board
PGA (Pin Grid Array): square chip package with pins arranged in
concentric squares, typically used for microprocessors
System Board: houses all essential chips and provides connecting
circuitry between them

Section D: Digital Processing


Programming Language: a set of keywords and grammar that allows
a programmer to write instructions that a computer can execute
Source Code: human readable version of a program created in a highlevel language by a programmer

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Complier: converts all the statements in a program in a single batch


and results in a collection of instructions called an object code which
is placed in a new file
Interpreter: an alternative to a complier; converts and executes one
statement at a time while the program is running; after a statement is
executed, the interpreter converts and executes the next statement
and so on
Instruction Set: collection of programmed activities, designed to be
general purpose so that programmers can use it in creative ways for a
wide variety of tasks performed by all kinds of digital devices
Machine Language: list of all codes for a microprocessors instruction
set and can be directly executed by the processors circuitry
Machine Code: set of machine language instructions for a program;
has two parts: 1/ operation code which is a command word for an
operation such as add, compare, etc., 2/ operand which is an
instruction specifies the data or the address of the data for the
operation
ALU (Arithmetic Logic Unit): part of the microprocessor that
performs arithmetic operations (such as addition and subtraction) as
well as logical operations (such as comparing two numbers)
Registers: used by the ALU to hold data that is being processed
Control Unit: fetches each instruction; data is loaded to the registers,
and the control unit gives the green light to begin processing
Instruction Cycle: the process in which a computer executes a single
instruction; 1/ fetch instruction, 2/ interpret instruction, 3/ execute
instruction, 4/ increment pointer to the next instruction

Section E: Password Security

Authentication Protocol: any method that confirms a persons


identity using something the person knows, something the person
possesses, or something the person is

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Biometrics: how a person can be identified; uses fingerprinting, facial


features, retinal pattern
User ID: series of characters (letters and numbers) that becomes a
persons unique identifier
Case Sensitive: differentiating between uppercase and lowercase
Password: series of characters that verify a user ID and guarantees
you are the person you claim to be; tend to be longer sequences of
characters requiring a full qwerty keyboard used with single-factor
authentication protocols
PIN: tend to be short sequences of numbers that can be entered using
a numeric keypad; typically used with two-factor authentication
protocols
Identity Theft: when someone gain unauthorized access to your
personal data and uses it illegally
Shoulder Surfing Hacking: when someone looks over your shoulder
to obtain a password
Dumpster Diving Hacking: when someone looks in the trash to
obtain a password
Dictionary Attack: helps hackers guess your password by stepping
through a dictionary containing thousands of the most commonly used
passwords
Brute Force Attack: uses password cracking software, but its range is
much more extensive than the dictionary attack
Sniffing: interprets information sent out over computer networks
Phishing: a hacker poses as a legitimate representative of an official
organization such as ISP, bank, online payment service in order to
persuade you to disclose highly confidential information
Key logger: software that secretly records a users keystrokes and
send the information to a hacker; it is a form of malicious code called a
Trojan horse (these are computer programs that seem to perform one
function while actually doing something else)

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Password Manager: stores user IDs with their corresponding


passwords and automatically fills in login forms
Standalone Password Manager: software application that feeds
passwords into login forms regardless of the software you are using
Password Strength Meter: indicators whether your passwords are
secure enough; a feature that is useful if youve created your own
passwords

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Chapter 2
Section A: Personal Computer Basics
Peripheral Devices: designates input, output, and storage equipment
that might be added to a computer system to enhance its functionality;
popular devices include printers, digital cameras, scanners, game
controllers, speakers, etc.
System Unit: holds the computers main circuit boards,
microprocessor, memory, power supply, and storage devices
Hard Disk Drive: the main storage device on a personal computer
system
Optical Drive: storage device that works with CDs, DVDs, or
combination of these storage media
Display System: consists of two parts; 1/ Circuitry, called a graphics
card, converts raw digital data into images that can be shown on a
display device, 2/ Display Devices, often called computer screens or
monitors, present visual output such as documents, videos, or pictures
Form Factor: refers to the size and dimensions of a component, such
as a system board or system unit
Desktop Computer: fits on a desk and plugs into a wall outlet; main
component of a typical desktop is a system unit that houses the
processor, memory, storage devices, display circuitry, and sound
circuitry

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Tower Case: provides plenty of space for gamers and modders who
want to enhance their machines by adding storage devices, lighted
power cables, or accelerated graphics cards
All-in-One Computer: a desktop computer form factor in which the
system unit and touch screen are integrated into a single unit
Portable Computer: small, lightweight personal computer with
screen, keyboard, storage, and processing components integrated into
a single unit that runs on power supplied by an electrical outlet or
battery
Notebook Computer: small, lightweight portable computer that
opens like a clamshell to reveal a screen and keyboard
Netbook: small version of a notebook computer, typically with a 10
screen
Home Computer System: encompasses a vast array of computer
configurations designed to accommodate consumers who use
computers for personal tasks
PC Platform: based on the design for one of the first personal
computer superstars the IBM PC; the Windows operating system was
designed specifically for these personal computers and, therefore, the
PC platform is sometimes called the Windsor platform
Mac Platform: based on a proprietary device for a personal computer
called a Macintosh, manufactured almost exclusively by Apple Inc.
Linux Platform: uses a standard PC or Mac to run Linux platform
Enhanced Media Player: handheld device, such as iPod Touch,
designed for playing music and videos, and offers camera, access to
the Internet, and a variety of apps; enhanced media players do not
typically include mobile phone capabilities
Smartphone: enhanced mobile phone that typically also functions as
a portable media player and has the capability to access the Internet
Tablet Computer: handheld computer that is essentially a larger
version of an enhanced media player

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Section B: Microprocessors and Memory


Microprocessor Clock: a timing device that sets the pace for
executing instructions
Gigahertz (GHz): means a billion cycles per second
Multi-Core Processor: a microprocessor that contains circuitry for
more than one processing unit
Front Side Bus: term that refers to the circuitry that transports data
to and from the microprocessor
Megahertz (MHz): means one million cycles per second
CPU Cache: special high speed memory that allows a microprocessor
to access data more rapidly than from memory located elsewhere on
the system board
Word Size: refers to the number of bits that a microprocessor can
manipulate at one time
64-Bit Processor: has 64-bits registers and processes 64 bits at one
time
Complex Instruction Set Computer (CISC): a general-purpose
microprocessor chip designed to handle a wider array of instructions
than a RISC chip
Reduced Instruction Set Computer (RISC): a microprocessor
designed for rapid and efficient processing of a small set of simple
instructions
Serial Processing: the processor must complete all steps in the
instruction cycle before it begins to execute the nest instruction
Pipelining: processor can begin executing an instruction before it
completes the previous instruction
Parallel Processing: multiple instructions are executed at the same
time

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Benchmarks: the result of a series of test that gauges the overall


speed of a microprocessor; can be compared to the results for other
microprocessors
Overclocking: a technique for increasing the speed of a computer
component, such as a processor, graphics card, system board, or
memory
RAM (Random Access Memory): temporary holding area for data,
application program instructions, and the operating system
Capacitors: microscopic electronic parts hold the bits that represent
data
Volatile: how most RAM is; means it requires electrical power to hold
data
Dynamic RAM (DRAM): random access memory that requires a
power source to hold data; used as main memory on most computers
Virtual Memory: if a program exceeds allocated space, an alternative
system is used to store parts of programs or data files until they are
needed
ROM (Read Only Memory): a type of memory circuitry that holds the
computers startup routine; is permanent and nonvolatile; holds hard
wired instructions that are permanent part of the circuitry and remain
in place even when the computers power is turned off
ROM BIOS (Basic Input/output System): instructions telling the
computer how to access the hard disk, find the operating system and
load it into RAM
EEPROM (Electrically Erasable Programmable Read Only
Memory): a nonvolatile chip that requires no power to hold data;
replaces CMOS technology that required power from a small battery
integrated into the system board

Section C: Storage Devices


Storage Medium: the disk, tape, CD, DVD, paper, or other substance
that contains data

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Storage Device: is the mechanical apparatus that records and


retrieves data from a storage medium
Storage Technology: a storage device and the media it uses; types
include magnetic, optical, and solid state
Access Time: average time it takes a computer to locate data on the
storage medium and read it; access time for a personal computer
storage device, such as a disk drive, is measured in milliseconds
Random Access: is the ability of a device to jump directly to the
requested data
Sequential Access: old-fashioned tape drives used this slower
version by reading through the data from the beginning of the tape
Data Transfer Rate: amount of data a storage device can move per
second from the storage medium to the computer
Storage Capacity: the maximum amount of data that can be stored
on a storage medium and is measured in bytes (usually gigabytes or
terabytes)
Storage Density: the amount of data that can be stored in a given
area of a storage medium; can be increased by making the particles
representing bits smaller, by layering them, packing them closer
together, or standing them vertically
Magnetic Storage: stores data by magnetizing microscopic particles
on a disk or tape surface
Hard Disk Drive: contains one or more platters and their associated
read write heads; preferred type of main storage for most personal
computers for three reasons; first it provides lots of storage capacity,
second it provides fast access to files, third a hard disk is economical
Hard Disk Platter: a flat, rigid disk made of aluminum or glass and
coated with magnetic iron oxide particles
Read Write Head: mechanism in the disk drive magnetizes particles
to write data, and sense the particles polarities to read data

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Head Crash: collisions between the read write head and the surface of
the hard disk platter, resulting in damage to some of the data on the
disk
Floppy Disk: a removable magnetic storage medium, typically 3.5 in
size, with a capacity of 1.44MB
CD (Compact Disk): technology was originally designed to hold 74
minutes of recorded music
DVD (Digital Video Disc): variation of CD technology that was
originally designed as an alternative to VCRs, but was quickly adopted
by the computer industry to store data; originally meant to hold 4.7 GB
of data storage (that is seven times as much capacity as a CD)
Blu-Ray: high capacity storage technology with a 25 GB capacity per
layer
Optical Storage: stores data as microscopic light and dark spots on
the disc surface; includes Blu-Ray, DVD, and CD; grouped into three
categories including read-only, recordable, and rewritable
Pits: the dark spots on an optical storage device
Lands: the lighter, non-pitted surface areas of the disc on an optical
storage device
Read-Only Technology (ROM): stores data permanently on a disc,
which cannot be subsequently added to or changed
Recordable Technology (R): uses a laser to change the color in a
dye layer sandwiched beneath the clear plastic disc surface; the laser
creates dark spots in the dye that are read as pits and the change in
dye is permanent, so data cannot be changed once it has been
recorded
Rewriteable Technology (RW): uses phase change technology to
alter a crystal structure on the disc surface; the crystal structure can
be changed from light to dark and back again many times, making it
possible to record and modify data much like on a hard disk
Solid State Storage (Flash Memory): technology that stores data in
erasable, rewriteable circuitry, rather than on spinning disks or

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

streaming tape; several types available including: memory cards, solid


state drives, and USB flash drives
Non-Volatile: once data is stored, it is non-volatile; the chip retains
the data without the need for an external power source
Memory Card: a flat, solid state storage medium commonly used to
transfer files from digital camera and media players to computers;
retain data when they are disconnected from computer and other
devices
Card Reader: device that reads and writes data on solid-state storage
Solid State Drive (SSD): a package of flash memory that can be
used as a substitute for a hard disk drive
USB Flash Drive: portable storage device that plugs directly into a
computers system unit using a built-in connector; files stored can be
opened, edited, deleted, and run just as though those files were stored
on magnetic or optical media
Drive Bays: areas within a computer system unit that can
accommodate additional storage devices

Section D: Input and Output Devices


Pointing Device: allows you to manipulate an on screen pointer and
other screen based graphical controls; most popular pointing device is
a mouse
Mouse: primary pointing device
Game Controllers: come in many styles such as joysticks, steering
wheels, and wands
Track-pad: is a touch sensitive surface on which you can slide your
fingers to move the on screen pointer; include buttons that serve the
same function as mouse buttons
Touch Screen: overlays a display screen; most commonly used touch
screen technology is a transparent panel coated with a thin layer of

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

electrically conductive material that senses a change in the electrical


current when touched
Virtual Keyboard: on the screen of a handheld device
LCD Display: produces an image by filtering light through a layer of
liquid crystal cells
CCFL (Cold Cathode Fluorescent Lamps: backlighting technology
replaced by low power LEDs (light emitting diodes)
Dot Pitch: measure of image clarity; smaller dot pitch means a crisper
image
Pixels: small dots of light that form an image
Viewing Angle Width: indicates how far to the side you can still
clearly see the screen image
Response Rate: time it takes for one pixel to change from black to
white and back to black
Color Depth: number of colors a monitor can display
Screen Resolution: number of horizontal and vertical pixels that a
device displays on the screen
Integrated Graphics: type of graphics circuitry that is built into a
computers system board
Dedicated Graphics: type of graphics circuitry mounted on a small
circuit board called a graphics card
Graphics Card: small circuit board that plugs into the system board
Graphics Processing Unit: stores screen images as they are
processed but before they are displayed
Ink Jet Printer: nozzle like print head that sprays ink onto paper to
form characters and graphics; the print head in a color ink jet printer
consists of a series of nozzles, each with its own ink cartridge

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Laser Printer: uses the same technology as a photocopier to paint


dots of light on a light sensitive drum; electrostatically charged ink is
applied to the drum and than transferred to paper
Dot Matrix Printer: produces characters and graphics by using a grid
of fine wires
Resolution: quality and sharpness of printed images and text depends
on the printers resolution; density of grid work of dots that create an
image
Print Speed: printer speeds are measured either by pages per minute
or characters per second
Duty Cycle: determines how many pages a printer is able to churn
out; usually measured in pages per month
Duplex Printer: can print on both sides of the paper
Printer Command Language (PCL): most widely used language for
communication between computers and printers
Post Script: an alternative printer language that many publishing
professionals prefer
Data Bus: how data travels from one component to another over a
circuit
Expansion Bus: the segment of the data bus to which peripheral
devices connect
Expansion Slot: long, narrow socket on the system board into which
you can plug an expansion cord
Expansion Cord: small circuit board that gives a computer the
capability to control a storage device, an input device, and an output
device
Expansion Port: any connector that passes data into and out of a
computer or peripheral device
USB (Universal Serial Bus): a high-speed bus commonly used for
connecting peripheral devices to computers
USB Hub: contains several auxiliary USB ports

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Fire Wire Port: used for external storage devices and for transferring
data from digital video cameras and computers
Thunder Bolt and eSATA: high-speed ports used for connecting
external storage devices
Hot-Plugging: when you connect or disconnect a peripheral device
while the computer is operating; allowed with USB and Fire Wire
devices
Plug and Play: automatically takes care of technical details; detects
new devices that are connected to a computer and attempts to
establish the settings necessary for sending data between them

Section E: Hardware Security


Power Surge: sudden increase in electrical energy affecting the
current that flows to electrical outlets
Surge Strip: device that contains electrical outlets protected by
circuitry that block surges
UPS (Uninterruptible Power Supply): device that not only provides
surge protection, but also furnishes desktop computers and network
devices with battery backup power during a power outage
Blue Screen of Death: suddenly replaces the usual graphical screen
display with an enigmatic error message written in white text against a
blue background; indicates the operating system has encountered an
error from which it cannot recover
Safe Mode: a limited version of Windows that allows you to use your
mouse, screen, and keyboard but no other peripheral devices

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Chapter 3
Section A: Software Basics
Music Software: offers ways to work with music, sound effects, and
narration from your desktop, notebook, or handheld computer
Audio Editing Software: tools that allow you to record, edit, and mix
digital audio

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Video Editing Software: provides a set of tools for creating video


productions from raw footage
DVD Authoring Software: offers tools for creating DVDs with
Hollywood style menus
Graphics: refers to any picture, drawing, sketch, photograph, image,
or icon that appears on your computer screen
Graphics Software: designed to help you create, manipulate, and
print graphics
Paint Software: provides a set of electronic pens, brushes, and paints
for painting images on the screen
Photo Editing Software: includes features designed to fix poor
quality photos by modifying contrast and brightness, cropping out
unwanted objects, and removing red eye; example is Adobe Photoshop
Drawing Software: provides a set of fine lines, shapes, and colors
that can be assembled into diagrams, corporate logos, and schematics
3D Graphics Software: provides tools for creating wireframes that
represent threedimensional objects
CAD Software (Computer Aided Design Software): special type of
3D graphics software designed for architects and engineers who use
computers to create blueprints and product specifications
Mapping Application: displays satellite, aerial, or street maps used
to locate places and get directions between two addresses
Location Based Software: able to access your current location and
use it to show you the closest shops, restaurants, and theatres as well
as information about each shop
Vertical Market Software: designed to automate specialized tasks in
a specific market or business
Horizontal Market Software: generic software that just about any
kind of business can use; example is QuickBooks or Payroll Software
Accounting Software: helps a business keep track of the money
flowing into and out of various accounts

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Project Management Software: important tool for planning large


projects, scheduling project tasks, and tracking project costs
Statistical Software: designed for analyzing large sets of data to
discover relationships and patterns
Mathematical Modeling Software: provides tools for solving a wide
range of math, science, and engineering problems
Desktop Publishing Software (DTP Software): takes word
processing to the next level by providing professional tools for
producing typeset quality documents; available in consumer level and
professional level versions
Money Management Software: offers a variety of tools for tracking
cash flow and investments
Personal Finance Software: designed to keep track of income,
expenses, assets, and liabilities using a simple checkbook-like user
interface
Tax Preparation Software: specialized type of personal finance
software designed to help you gather your annual income and expense
data, identify deductions, and calculate tax payments
Utility Software: designed to help you monitor and configure settings
for your digital gear, its operating system, or application software
PDF (Portable Document Format): standard format for exchanging
files, so most people will assume that your computer has PDF
capability
System Utilities: track down and fix disk errors, repair corrupted files
and give your device a performance-enhancing tune up
Adaptive Utilities: provides closed captioning, text to speech, speech
to text, or large screen text
Device Driver: software that helps a peripheral device establishes
communication with a computer

Section B: Office Suites

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Productivity Software: offer features that help get work done;


examples are
Microsoft Office and Google Docs
Office Suite: collection of programs that typically include word
processing, spreadsheet, presentation, and database modules
Modules: refers to a component such as a word processing module
Word Processing Software: replaced the typewriter for producing
many types of documents
Word Wrap: determines how your text flows from line to line by
automatically moving words down to the next line as you reach the
right margin
Search and Replace: feature to hunt down mistakes that you
habitually make in writing
Thesaurus: helps find a synonym for a word so that you can make
your writing more varied and interesting
Grammar Checker: reads your document and points out potential
grammatical trouble spots
Readability Formula: analyze the reading level of your document
using a standard formula
Spelling Checker: marks misspelled words in a document
Spelling Dictionary: a list of correctly spelled words stored in a data
file
Document Formatting: refers to the way that all the elements of a
document are arranged on the page
Page Layout: the physical position of each element on a page in
addition to paragraphs of text
Header: text that you specify to automatically appear in the top
margin of every page
Footer: text that you specify to automatically appear in the bottom
margin of every page

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Paragraph Style: includes the alignment of text within the margins


and the space between each line of text
Leading: the spacing between lines of text
Paragraph Alignment: the horizontal position of text
Fully justified: text is aligned evenly on both the right and left
margins
Font: set of letters that share-unified design; measure in point size
Style: apply several fonts and paragraph characteristics with a single
click
Spreadsheet: uses rows and columns of numbers to create a model
or representation of a real situation
Spreadsheet Software: provides tools to create electronic
spreadsheets
What-if Analysis: answer what-if questions
Worksheet: based on a grid of columns and rows
Cell: contains a value, label or formula
Value: number that you want to use in a calculation
Label: any text used to describe data
Formula: works behind the scenes to tell the computer how to use the
contents or cells in calculations
Cell References: the column letter and row number that designate
the location of a worksheet cell
Mathematical Operations: symbols that represent specific
mathematical functions in a formula
Function: built-in in preset formula

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Automatic Recalculation: feature ensures that the results in every


cell are accurate for the information currently entered in the worksheet
Relative Reference: in a worksheet, a cell reference that can change
if cells change position because of a move or copy operation
Database: a collection of data that is stored on one or more
computers
Database Software: helps you enter, find, organize, update, and
report information stored in a database; stores data as a series of
records, which are composed of fields that hold data
Record: holds data for a single entity a person, place, thing or event
Field: holds one item of data relevant to a record
Query: describes the information you want to find
Query Language: provides a set of commands for locating and
manipulating data
Natural Language Query: question stated in a language such as
English, rather than an esoteric query language
Keyword Search: popular with search engines such as Google;
collection of words relevant to your search
Query by Example: requires you to fill out a form with the type of
data you want to locate
Presentation Software: supplies the tools for combining text,
photos, clip art, graphs, animations, and sound into a series of
electronic slides that can be shown on a computer screen or projector

Section C: Installing Software and Upgrades


Software Installation: process of placing a program into a computer
so that it can be run or executed
Web Application: software that is accessed with a Web browser

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Mobile App: designed for handheld devices such as smartphones,


tablet computers, or enhanced media players
Jail breaking: an unauthorized change to the devices software
Rooting: process that enables users to gain root access to Android
mobile devices with the purpose of overcoming limitations imposed by
mobile service providers
Setup Program: guides you through the installation process
Executable Files: designed to be started by users or automatically
launched by operating system (EXE)
Zipped: refers to one or more files that have been compressed
Unzipped: refers to files that have been compressed
Portable Devices: designed to run from removable storage, such as
CDs or USB flash drive
Software Upgrade: software publishers replace older versions of a
software product with a new version
Software Update: small section of program code that replaces part of
the software you currently have installed
Service Pack: set of patches designed to correct problems and
address security vulnerabilities; usually applies to the operating
system
Uninstall Routine: deletes the softwares files from various folders on
your computers hard disk

Section D: Buying Software


System Requirements: specify the operating system and minimum
hardware capacities necessary for a software product to work correctly
Copyright: form of legal protection that grants the author of an
original work an exclusive right to copy, distribute, sell, and modify the
work

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Copyright notice: a line that defines a copyright holder


Pirated Software: software that is copied, sold, or distributed without
permission from the copyright holder
Software License: legal contract that defines the ways in which you
may use a computer program
Single User License: limits use to one person at a time
Site License: allows software to be used on all computers at a specific
location
Multiple User License: priced per user and allows the allocated
number of people to use the software at any time
Concurrent User License: priced per copy and allows a specific
number of copies to be used at the same time
Shrink Wrap License: goes into effect as soon as you open the
packaging
EULA (End User License Agreement): displayed on screen when
you first install software
Public Domain Software: not protected by copyright because the
copyright has expired or the author has placed the program in the
public domain, making it available without restriction
Proprietary Software: have restrictions on its use that are delineated
by copyright, patents, or license agreement
Commercial Software: sold in computer store or websites; even
though you buy the software you actually purchase only the right to
use it under the terms of the software license
Demoware: distributed for free and often comes preinstalled on new
computers, but is limited in some way until you pay for it
Shareware: copyrighted software marketed under a try before you
buy policy; typically includes a license that permits you to use the
software for a trial period

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Open Source Software: makes uncompiled instructions the source


code available to programmers who want to modify and improve the
software; example is Linux
BSD License (Berkley Software Distribution): open source
software license patterned on a license originally used by the
University of California
GPL (General Public License): developed for free operating system
call GNU; more restrictive than BSD license because it requires
derivative works to be licensed
Freeware: copyrighted software that is available free
Product Activation: means of protecting software from illegal
copying by requiring users to enter a product key or activation code
before the software can be used Hash Value: unique number derived
from encoding one or more data sets, such as names, serial numbers,
and validation codes

Section E: Security Software


Security Software: designed to protect computers from various
forms of destructive software and unauthorized intrusions
Malicious Software and Malware: refer to any computer program
designed to surreptitiously enter a computer, gain unauthorized access
to data, or disrupt normal processing operations
Computer Virus: set of program instructions that attaches itself to a
file, reproduces itself, and spreads to other files
Computer Worm: self-replicating program designed to carry out some
unauthorized activity on a victims computer
Mass Mailing Worm: spreads by sending itself to every address in
the address book of an infected computer
Trojan Horse: computer program that seems to perform one function
while actually doing something else

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Remote Access Trojan (RAT): backdoor capabilities that allow


remote hackers to transmit files to victims computers, search for data,
run programs, and use a victims computer as a relay station for
breaking into other computers
Bot: any software that can automate a task or autonomously execute
a task when commanded to do so is called an intelligent agent
Zombie: computer under a control of a bad bot; carries out
instructions form malicious leader
Botnet: person who controls many bot-infested computer can link
them together into a network
Spyware: type of program that secretly gathers personal information
without the victims knowledge, usually for advertising and other
commercial purposes
Rootkit: refers to software tools used to conceal malware and
backdoors that have been installed on a victims computer; can hide
bots, keyloggers, spyware, worms and viruses; with a rootkit in place,
hackers can continue to exploit victims computer with little risk of
discovery
Virus Hoax: usually arrives as an email message containing dire
warnings about a supposedly new virus on the loose
Security Suite: integrates several security modules to protect against
the most common types of malware, unauthorized access, and spam
Antivirus Software: type of utility software that looks for and
eradicates viruses, Trojan horses, worms, and bots
Virus Signature: section of program code, such as a unique series of
instructions that can be used to identify a known malicious program
Virus Definitions: virus signatures and other information that
antivirus software uses to identify and eradicate malware are stored in
one or more files
Quarantined File: contains code that suspected of being part of a
virus

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Chapter 4
Section A: Operating System Basics
Operating System: an integral part of virtually every computer;
controls the computers use of its hardware resources; master
controller for all activities that take place within a computer system;
ensures input and output proceed in an orderly manner
Resource: any component that is required to perform work
Multitasking: provides process and memory management services
that allow two or more tasks, jobs, or programs to run simultaneously
Multithreading: allows multiple parts, or threads, to run
simultaneously

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Multiprocessing: capability supports a division of labor among all the


processing units
Memory Leak: an undesirable state in which a program requests
memory but never releases it, which can eventually prevent other
programs from running
Buffer: region of memory that holds data waiting to be transferred
from one device to another
Single User Operating System: expects to deal with one set of input
devices those that can be controlled by one user at a time
Multi-User Operating System: allows a single, centralized computer
to deal with simultaneous input, output, and processing requests from
many users
Server Operating System: provides tools for managing distributed
networks, email servers, and Web hosting sites
Desktop Operating System: designed for a desktop or notebook
personal computer; designed to accommodate one user at a time but
also provides network capability; examples are Microsoft Windows or
Mac OS
Handheld/Mobile Operating System: designed for handheld or
mobile devices and includes modules for mobile connectivity and
alternative input and output such as touchscreens
User Interface: the combination of hardware and software that helps
people and computers to communicate with each other
Command Line Interface: original system, required users to type
memorized commands to run programs and accomplish tasks
Graphical User Interface (GUI): provides a way to select menu
options and manipulate graphical objects displayed on the screen
using a mouse or gesture; each graphical object represents a computer
task, command, or real world object
Desktop: where icons and windows and displayed
Icon: small picture that represents a program, file, or hardware device

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Window: rectangular work area that can hold a program, data or


controls
Button: graphic, usually rectangular, that can be clicked to make a
selection; can be arranged on a menu bar, toolbar, taskbar, or ribbon
Menu Bar: displayed as a strip of clickable options that in turn, display
a list of commands
Toolbar: displays icons representing tools, commands, and other
options
Taskbar: usually displayed near the bottom of the screen to help users
launch and monitor applications
Ribbon: presents users with multiple tabs instead of menus at the top
of the application window; popularized by Microsoft Office 2007
Menu: displays a list of commands or options; each line is referred to
as a menu item or option; you simply choose the command you want
from a list
Submenu: additional set of commands that the computer displays
after you make a selection from the main menu
Dialogue Box: displays the options associated with a command
Kernel: provides essential operating system services such as memory
management and file access; stays in RAM all the time your computer
is on
Boot Process: sequence of events that occurs between the time you
turn on a computer and the time that it is ready for you to issue
commands; commands include: 1/ power up, 2/ start boot program, 3/
power-on self-test, 4/ identify peripheral devices, 5/ load operating
system, 6/ check configuration and customization
Bootstrap Program: built into special ROM circuitry housed in the
computers system unit

Section B: Todays Operating Systems

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Microsoft Windows: gets its name from the rectangular work areas
that appear on the screen based desktop; installed on more than 80%
of the worlds computers
Strengths
Runs more programs
than any other operating
system Variety of
hardware platforms that
can run on Windows
Large user community
Excellent support in
form of built-in drivers
and Plug and
Play function
Users are the target market

Weaknesses
Reliability (Windows
tends to become
unstable with more
user frequency)
Reputation for being
vulnerable to viruses,
worms, and attacks
Has many security
holes that are found
and exploited

MAC OS: operating system designed for Apple Computers Macintosh


line
Strengths
Weaknesses
Easy to use
Limited selection of
software and use of
Developers are in the lead
resource forks Popular
for intuitive user interface
software is not
design Uses UNIX which
available for Mac
includes industrial strength
memory protection
Low errors and glitches
- Limited security holes and
fewer viruses
Dual Boot: utility that can switch between Mac OS and Windows
Virtual Machine: technologies that allow you to use one computer to
simulate the hardware and software of another
Data Fork: similar to files in other operating systems; contains data as
the text for a document, graphics for a photo, commands for a program
Resource Fork: companion file that stores information about the data
in the data fork, such as the file type and the application that created it
UNIX: operating system that was developed in 1969 at AT&T Bell Labs;
gained good reputation for its dependability in multiuser environments,

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

and many versions of it became available for mainframes and


microcomputers
Linux: frequently used operating system for servers; not as popular for
desktop applications
- Secure and reliable
Weaknesses
Strengths
- Requires more tinkering
- Allows everyone to
than other operating
make copies for own
systems
use, give to
- Comparatively limited
others, or to sell
number of programs that
- Multitasking and
run
multiuser capabilities
- Discourages many non
technical users
Linux Distribution: download that contains the Linus kernel, system
utilities, graphical user interface, applications, and an installation
routine
DOS (Disk Operating System): first operating system that many
used; developed by Microsoft and introduced on the original IBM PC in
1982; used cryptic command line user interface
IOS: version of Mac OS X written for the iPhones ARM processor and
optimized for touch-screen communications applications
Symbian: popular handheld operating system used with Nokia and
Ericsson smartphones
Blackberry OS: proprietary operating system produced by RIM, a
Canadian Company that developed Blackberry Smartphone; key
feature is its ability to work with corporate email software systems
produced by Microsoft and IBM
Android OS: open source operating system developed by Google and
designed for mobile devices, such as smartphones and netbooks; it is
based on the Linux kernel
Windows Phone 7: replaced Windows Mobile OS 2007; features a
series of tiles that represent applications, contacts, links, or media
HP webOS: developed for popular Palm brand PDAs and smartphones;
based on a system of cards that represent applications in a
multitasking environment

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Section C: File Basics


File Naming Conventions: a set of rules, established by the
operating system that must be followed to create a valid file name
File Extension: optional file identifier that is separated from the main
file name by a period; provide clues to the files contents
Reserved Words: used as commands or special identifiers; cannot
use these words in a file name
Disk Partition: section of a hard disk that is treated as a separate
storage unit
Directory: operating systems list of files for each storage disk, CD,
DVD, or USB flash drive
Root Directory: main directory; identified by that device letter
followed by a backslash
Subdirectory: the root directory subdivided into smaller lists; these
smaller lists are the subdirectory
File Specification: a computers file location; sometimes called a
path; includes the drive letter, folder(s), file name, and extension
File Size: usually measured in bytes, kilobytes, or megabytes; large
files fill up storage space more quickly, require large transmission
times, and are more likely to be stripped off email attachments by a
mail server
File Date: useful if you have created several versions of a file and
want to make sure you know the most recent version
File Format: organization and layout of data that is stored in a file
File Header: section of a data at the beginning of a file that contains
information about a file, such as the date it was created, the date it
was last updated, its size, and its file type

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Native File Format: software application can open files that exist in
native file formats plus several additional file formats

Section D: File Management


File Tag: piece of information that describes a file
File Management Utility: give you the big picture of the files you
have stored on your disks and helps you work with them
Local Storage Models: storage metaphors that help you visualize
and mentally organize the files on your disks and other storage
devices; metaphors are supposed to help you form a mental picture of
the way in which your files are stored
Windows Explorer: utility program bundled with the Windows
operating system and designed to help you organize and manipulate
the files stored on your computer
Library: folder used to group similar files, however, a library does not
actually store files
Physical Storage Model: describes what actually happens on the
disks and in the circuits
Formatting: process creates the equivalent of electronic storage bins
by dividing a disk into tracks and then further dividing each track into
sectors
Dis Mastering: process of creating a CD, DVD, or BD by selecting all
the files and then copying them to a single session
Packet Writing: recording technology that lets you record in multiple
sessions
File System: keep track of the names and locations of files that reside
on a storage medium, such as a hard disk
Cluster: group of sectors on a storage medium that, when accessed as
a group, speeds up data access

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

File Shredder Software: software used to delete data from a disk in


such a way that no one can ever read it; overwrites supposedly empty
sectors with random 1s and 0s
Fragmented Files: files stored in scattered, noncontiguous clusters
on a disk
Defragmented Utility: rearrange the files on a disk so that they are
stored in contiguous clusters

Section E: Backup Security


Backup: stores the files needed to recover data thats been wiped out
by operator error, viruses, or hardware failures; allows you to restore
data from a backup to the original location or to a replacement device
Online Backup Services: web site that offers storage space for
backups
Synchronization: compares the content of files on two devices and
makes them the same; it maintains a parallel set of files on your
computers hard disk and your backup device
Backup Software: set of utility programs designed to back up and
restore some or all the files on a computers primary storage device
Full Backup: makes a fresh copy of every file in the folders youve
specified for the backup; full back up does not necessarily contain
every file on your computer
Differential Backup: makes a backup of only those files that were
added or changed since your last full backup session
Incremental Backup: backs up files that were added or changed
since the last backup not necessarily the files that changed from the
last full backup, but the files that changed since any full or incremental
backup
Boot Disk: removable storage medium containing the operating
system files needed to boot your computer without accessing the hard
disk

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Recovery Disk: bootable CD, DVD or other media that contains a


complete copy of your computers hard disk as it existed when the
computer was new
Recovery Partition: section of the hard disk that contains the files
necessary to restore a computers hard disk contents to factory
condition
Windows Registry: important group of files used by the Windows
operating system to store configuration information about all the
devices and software installed on a computer system
Restore Point: snapshot of your computer settings; backups of the
Windows Registry
Bare Metal Restore: a process by which a backup is restored to a
hard disk without first reinstalling the operating system and device
drivers
Disk Image: bit-by-bit copy of the data from all sectors of a disk;
creates an exact clone of the original disk, unlike most backup software
that makes file-by-file copies

Chapter 5
Section A: Network Building Blocks
PAN (Personal Area Network): interconnection of personal digital
devices or consumer electronics within a range of about 30 feet and
without the use of wires of cables

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

LAN (Local Area Network): connects personal computers within a


very limited geographical area usually a single building; use a variety
of wired and wireless technologies
MAN (Metropolitan Area Network): public high-speed network
capable of voice and data transmission within a range of about 50
miles
WAN (Wide Area Network): covers a large geographical area and
usually consists of several smaller networks, which might use different
computer platforms and network technologies; Internet is the worlds
largest WAN
Shared Resources: hardware, software, and data made available for
authorized network users to access
Node: each connection point on a network
Network Interface Card (NIC): to connect to a LAN, a computer
requires network circuitry; can be built into the system board of most
personal computers but if not, it can be added to a slot in the system
board or to a USB port
Networked Peripheral: any device that contains network circuitry to
directly connect to a network
Network Attached Storage (NAS): storage device that directly
connects to a network
Network Device: any electronic device that broadcasts network data,
boosts signals, or routes data to its destination
Router: acts as a central distribution point for getting data to its
destination
Communications Channel: physical path or a frequency for signal
transmission
Optical Fiber Cable: composed of many strands of glass tubes that
are not much wider than a human hair; data signals speed through
these tubes as rays of light Bandwidth: transmission capacity of a
communications channel; a high-bandwidth communications channel
can carry more data than a low-bandwidth channel; channel carrying

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

digital data is measured in bps (bits per second) and a channel


carrying analog data is measured in Hz (hertz)
Broadband: high bandwidth communications systems
Narrowband: low bandwidth communications systems
Communications Protocol: set of rules for efficiently transmitting
data from one network node to another
Handshaking: two computers on a network negotiate their
communications protocols through this process; like the sound of two
fax machines connecting
Packet: when sending a file or email message; parcel of data that is
sent across a computer network; each packet contains the address of
the sender, destination address, sequence number, and some data;
when packets reach their destination they are reassembled into the
original message according to the sequence numbers
Circuit Switching: technology, which essentially establishes a
dedicated, private link between one telephone and another for the
duration of the call
Packet Switching: technology, which divides a message into several
packets that, can be routed independently to their destinations
MAC Address: unique number assigned to a network interface card
when it is manufactured; used for some low level network functions
and can also be employed to establish network security
IP Address: series of numbers used to identify a network address
Octet: each section of an IP address that is represented by eight bits
in binary
DHCP (Dynamic Host Configuration Process): protocol designed to
automatically distribute IP Addresses

Section B: Wired and Wireless Technology


Wired Technology: uses cables to connect network devices

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Ethernet: wired network technology that is defined by IEEE 802.3


standards; the dominant standard for wired connections in local area
networks; it simultaneously broadcasts data packets to all network
devices and a packet is only accepted by the device to which it is
addressed
Ethernet Adapter: plugs into a USB port and can be used with a
notebook or desktop computer
Wireless Technology: transport data from one device to another
without the use of cables or wires; no physical connection
RF Signals: are sent and received by a transceiver that is equipped
with an antenna
Microwave: provide another option for transporting data; electronic
signals
Infrared Light Beams: can carry data signals for a short distances
and with a clear line of sight; practical use is transmitting data
between devices connected to a PAN
Bluetooth: short range of wireless network technology that is
designed to make connections between two devices
Pairing: creates a link between two devices through the exchange of
an authentication code called a passkey; when complete they two
devices never have to share a passkey again
Discovery Mode: open for pairing and can discover one another and
exchange passkeys
Wi-Fi: set of wireless networking technologies; device transmits data
as radio waves over 2.4 or 5.8 GHz frequencies
Wireless Infrastructure Protocol: centralized broadcasting device
coordinates communication among network devices
MIMO (Multiple Input Multiple Output): technology uses two or
more antennas to essentially sent multiple sets of signals between
network devices
AirPort: how Apple handles wireless networking

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Section C: Network Setup


SSID (Service Set Identifier): name of a wireless network; help you
log in to the right network
Wireless Encryption: scrambles the data transmitted between
wireless devices and then unscrambled the data only on devices that
have a valid encryption key
WEP (Wired Equivalent Privacy): original wireless encryption
protocol designed to provide a level of confidentiality similar to that of
a wired network
WPA (Wi-Fi Protected Access): offer stronger protection by making
sure packets have not been intercepted or tamper with in any way
PSK (Pre-Shared Key): type of WPA used on most home networks
Wireless Encryption Key: basis for scrambling and unscrambling the
data transmitted between wireless devices

Section D: Sharing Files


File Sharing: allows files containing documents, photos, music, and
other data to be accessed from computers other than the one on which
they are stored
Network Discovery: setting that affects whether you computer can
see other computers on a network, and whether others can see your
computer
Public Folder: designed to hold files and folders that you want to
share with other people on your network
File Server: computer whose primary purpose is to be a repository for
files that can be accessed by a network workstation; designed to run
continuously so their files are always accessible

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Section E: Wireless Security


Encryption: transforms a message in such a way that its contents are
hidden from unauthorized readers
Plaintext: an original message that has not been encrypted
Ciphertext: a message that has been encrypted
Decryption: the reverse process
Cryptographic Algorithm: procedure for encrypting and decrypting a
message
Cryptographic Key: word, number, or phrase that must be known to
encrypt or decrypt a message
Weak Encryption: east to decrypt even without the algorithm and
key
Strong Encryption: very difficult to break
AES (Advanced Encryption Standard): technology used for WPA2
and is one of the strongest cryptographic algorithms
Symmetric Key Encryption: key is used to encrypt a message and
used to decrypt the message
Public Encryption Key (PKE): eliminates the key distribution
problem by using one key to encrypt a message but another key to
decrypt the message

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Chapter 6
Section A: Internet Technology
Internet Backbone: network of high capacity routers and fiber optic
communications links that provides the main routes for data traffic
across the Internet
Network Service Provider (NSP): how the backbone links and
routers are maintained; examples are AT&T, Sprint, and Verizon
Network Access Points: how NSP equipment and links are tied
together
Internet Service Provider (ISP): company that offers Internet
access to individuals, businesses, and smaller ISPs
Modem: contains circuitry that converts the data carrying signals from
your computer to signals that can travel over various communications
channels; depends on the connection as either dialup, wireless, cable,
satellite, or DSL internet service
TCP/IP: primary protocol suite responsible for message transmission
on the Internet
Protocol Suite: combination of protocols that work together

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

TCP (Transmission Control Protocol): breaks a message or file into


packets
IP (Internet Protocol): responsible for addressing packets so that
they can be routed to their destination
Static IP Address: permanently assigned IP address
Dynamic IP Address: temporary assigned IP address
Always On Connection: linked to your ISP and is online whenever the
computer and modem is on, even if not actively accessing the Internet
Domain Name: key component of Web page addresses and email
addresses; full name is fully qualified domain name (FQDN)
Top Level Domain: domain name ends with an extension
Domain Name System (DNS): every domain name corresponds to a
unique IP address that has been entered into a huge database
Domain Name Server: any computer that hosts this database
DNS Cache Poisoning: if a domain name server malfunctions or is
hacked, Internet users can get directed to the wrong website
ICANN (Internet Corporation for Assigned Names and
Numbers): the global organization that coordinates technical
management of the Internets Domain Name System
Latency: elapsed time for data to make a round trip from point A to
point B and back to point A; generally averages less than 100
milliseconds in North America
Ping (Packet Internet Groper): sends a signal to a specific Internet
address and waits for a reply; when a reply arrives, Ping reports that
the computer is online and displays the elapsed time for the round-trip
message
Traceroute: records a packets path in addition to its round-trip speed
Upstream Speed: the rate of data that is uploaded from your
computer to the Internet
Downstream Speed: rate of data downloaded to your computer

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Asymmetric Internet Connection: when upstream speeds differ


from downstream speeds
Symmetric Internet Connection: when upstream and downstream
speeds are the same
Fixed Internet Access: links your computer to an ISP from a
stationary point, such as a wall sockets or roof mounted antenna
Portable Internet Access: allow you to easily move your access
network
Mobile Internet Access: allow you to use the Internet as you are on
the go

Section C: Portable and Mobile Internet Access


Wi-Fi Hotspot: an area in which the public can access a Wi-Fi network
that offers Internet service
WAP (Wireless Application Protocol): communications protocol
that provides Internet access from handheld devices, such as cell
phones
Mobile Broadband: cellular service providers offer data services;
broadband access requires a fast connection, a data service
subscription, and mobile broadband equipment
Mi-Fi: brand name for a compact, mobile, wireless router offered by
Novatel Wireless; these routers connect to a mobile carriers
broadband data service and provide a wireless hotspot for up to five
devices

Section E: Internet Security


Intrusion: any access to data or programs by hackers, criminals, or
other unauthorized persons
Communications Port: doorway that allows a computer to exchange
data with other devices

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Port Probe: use of automated software to locate computers that have


open ports and are vulnerable to unauthorized access
Firewall: software or hardware designed to filter out suspicious
packets attempting to enter or leave a computer
Routable IP Address: can be accessed by packets on the Internet
Private IP Address: non-routable IP address that can be used within
a LAN, but not for Internet data transport
Network Address Translation (NAT): process your router uses to
keep track of packets and their corresponding private or public IP
addresses
Virtual Private Network (VPN): useful when using public computers
because it can encrypt the data you transmit, keeping passwords and
account numbers safe from hackers

Chapter 7
Section A: Web Technology
Web: collection of documents, images, videos, and sound files that can
be linked and accessed over the Internet using a protocol called HTTP
Hypertext: way of organizing a collection of documents by assigning
an address to each and providing a way to link from one address to
another
Web 2.0: group of new and innovative ways to use the Web, such as
for social networking, blogging, and wikis

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Web 3.0: group of technologies including cloud computing that extend


the ways in which the Internet and Web can be used
Web Site: contains a collection of related information organized and
formatted so it can be accessed using software called a browser
Web Server: Internet based computer that accepts requests from
browsers
Web Page: product or output of one or more web based files displayed
in a format similar to a page in a book; can dynamically incorporate
videos, sounds, and interactive elements
Web Browser: client software that displays web page elements and
handles links between pages; can access a web page by clicking
hypertext link or by typing a URL
Hypertext Link: an underlined work or phrase on a web page that,
when clicked, takes you to a designated URL
URL: the unique address every web page has
HTML (Hypertext Markup Language): set of specifications for
creating documents that a browser can display as a web page
Markup Language: called this because authors markup documents
by inserting special instructions, called HTML tags
HTML Tags: specify how the document should appear when displayed
on a computer screen or printed; enclosed in angle brackets and
embedded in the document; instructions for the browser
XHTML: markup language similar to HTML but can be customized with
tags that describe the data in databases; more rigidly structured and
more complex
HTML Document: similar to a word-processing file but has a .htm
or .html extension
Source Document: sometimes an HTML document is referred to this
because it is the source of the HTML tags used to construct a web page
HTTP: protocol that works with TCP/IP to get web resources to your
desktop

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Sockets: an abstract concept that represents one end of a connection


Persistent HTTP Connection: reuses the same HTTP connection to
send and receive multiple requests; todays browsers use persistent
connections to obtain text, images, and audio for a web page during a
single session
HTTP Status Code: indicates whether the browsers request could be
fulfilled; status code 200 means the request was fulfilled
Web Cache: where the browser stores temporary files on your
computer
Plug-In: program that extends a browsers ability to work with file
formats; most plug-ins can be downloaded from the web; come in
different versions for different browsers
Cookie: small chunk of data generated by a web server and stored in
a text file on your computers hard disk; allow a web site to store
information on a client computer for later retrieval
Stateless Protocol: maintains no record of the pages you visit at a
website
HTML Conversion Utility: adds HTML tags to a document,
spreadsheet, and other text based files to create an HTML document
that can be displayed by a browser
Web Authorizing Software: provides tools specifically designed to
enter and format web page text, graphics, and links; example is Adobe
Dreamweaver
HTML Script: series of instructions inserted into an HTML document to
provide formatting and display information to a web browser
HTML Forms: an HTML documents containing blank boxes that
prompt users to enter information that can be sent to a web server
Server-side Script: consists of statements that run on a server;
accept data submitted by a form, process that data, and then generate
a custom HTML document that is sent to the browser for display

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Client-side Script: consists of scripting statements that run on your


local computer; script is executed by the browser, which must have the
capability to deal with the programming language used to write the
script
Java Applet: application written in the java programming language;
small programs that add processing and interactive capabilities to web
pages
Action Script: programming language for Adobe Flash Player; used to
create sophisticated applications that can be launched from web pages
and viewed using the Flash browser plug in or the standalone flash
player
ActiveX Control: compiled computer program that can be referenced
from within an HTML document, downloaded, installed on your
computer, and executed within the browser window
Digital Certificate: electronic attachment to a file that verifies the
identity of its source

Section B: Search Engines


Web Search Engine: program designed to help people locate
information on the Web by formatting simple keyword queries; contains
four components: web crawler, indexer, database, and query processor
Web Crawler: computer program that is automated to methodically
visit web sites; can be programmed to perform various activities as
they visit sites, but in the context of search engines; web crawlers
download web pages and submit them to an indexing utility for
processing
Search Engine Indexer: software that pulls keywords from web
pages and stores them in an index database; purpose of the indexer to
make pages easy to find based on their contents
Query Processor: looks for your search terms in the search engines
indexed database and returns a list of relevant web sites; the order in
which web sites are listed in response to a search depends on
relevancy criteria, such as keyword matches and link popularity

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Link Popularity: measure of the quality and quantity of the links from
on web page to others; pages with links to and from popular sites tend
to get high relevancy ratings
Meta Keyword: entered into a header section of a web page when it
is created and is supposed to describe the page contents
Keyword Stuffing: an unethical practice in which Meta keywords are
manipulated to gain high relevancy rankings
Search Items: keyword queries in which you enter one or more words
related to the information you want to find
Search Operator: word or symbol that describes a relationship
between search terms and thereby helps you create a more focused
query; words like and, or, not, , *,
Meta Search Engine: searches a series of other search engines and
compiles search results; popular sites include www.polymeta.com,
www.dogpile.com, and www.webcrawler.com

Section E: Web and Email Security


Ad-Serving Cookies: claim that the data in their cookies is used
simply to select and display ads that might interest you, but privacy
advocates worry that shopper profiles can be compiled, sold, and used
for unauthorized purposes
First Party Cookies: created by the web site that you are visiting;
example is that if you visit Amazon, it sets a cookie for your shopping
cart and that is classified as a first party cookie
Third Party Cookie: set by an affiliated site; usually associated with
marketing and advertising, so most third party cookies are not
desirable
Flash Cookie: also called local shared object; is the flash equivalent of
a conventional web cookies; are set and used by Adobes Flash Player
which is installed on practically every computer to run movies, videos,
and games; can collect personal data and surreptitiously operate your
computers built in camera

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Web Bug: a 1x1 pixel graphic embedded in a web page or email


messages; it is almost invisible due to its size and is designed to track
who is reading the web page or email message; web bugs can
generate third party ad serving cookies
Antispyware: type of security software designed to identify and
neutralize web bugs, ad-serving cookies, and other spyware
Anonymous Proxy Service: uses an intermediary, or proxy, server to
relay web page requests after masking the originating IP address
Spam: unwanted electronic junk mail about medical products, low cost
loans, and fake software upgrades that arrives in your online mailbox
Spam Filter: type of utility software that captures unsolicited email
messages before they reach your inbox; works by checking the text of
email headers and messages against a series of rules
Phishing: email based scan that is designed to persuade you to reveal
confidential information such as bank account information or social
security numbers; require you reply to an email message or click an
embedded web site link for the scam to unfold
Pharming: an exploit that redirects users to fake sites by poisoning a
domain name server with a false IP address; more sophisticated than
phishing because the link appears to be for a legitimate URL

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Chapter 8
Section A: Digital Sound
Digital Audio: music, speech, and other sounds represented in binary
format for use in digital devices
Sampling Rate: the number of times per second that a sound is
measured during the recording process
Audio Compression: reduces the size of a sound file by removing bits
that represent extraneous noise and sounds that are beyond the
frequencies of normal hearing
Sound Card: device that contains a variety of input and output jacks,
plus audio producing circuitry
Integrated Audio: sound card circuitry that is built into the circuitry
of a digital device, in contrast to the use of an add-on sound card
Digital Signal Processor: circuitry that is used to process, record,
and play back audio files
AAC (Advanced Audio Coding): file format that provides highly
compressed audio files with very little loss of sound quality and is
promoted by Apple on its iTunes web site
MP3 (MPEG-1 Layer 3): file format that provides highly compressed
audio files with very little loss of sound quality
WAV: audio file format with a .wav extension that was Windows
original native sound format
WMA (Windows Media Audio): file format with a .wma extension
that is promoted by Microsoft and provides highly compressed audio
files with very little loss of sound quality
Streaming Audio: plays as its file is downloaded

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Ripping (Digital Audio Extraction): process of importing tracks


from a CD or DVD to your computers hard disk
Synthesized Sound: artificially created, or synthetic, sound
MIDI (Musical Instrument Digital Interface): standardized way in
which sound and music are encoded and transmitted between digital
devices that play music
MIDI Sequence: digitally encoded MIDI music stored on a digital
device, such as a computer or MIDI instrument
Wavetable: set of prerecorded musical instrument sounds
Speech Synthesis: process by which machines, such as computers,
produce sounds that resembles spoken words
Speech Recognition: the ability of a machine to understand spoken
words
Phoneme: a basic sound unit
Text-To-Speech Software: generates sounds that are played through
your computers standard sound card

Section B: Bitmap Graphics


Bitmap Graphic: composed of grid dots and the color of each dot is
stored as a binary number
GIF (Graphics Interchange Format): bitmap graphics file format
popularized by
CompuServe for use on the web
JPEG (Joint Photographic Experts Group): format that uses lossy
compression to store bitmap images
PNG (Portable Network Graphics): type of graphics file format
similar to but newer than GIF or JPEG
Scanner: converts the printed image into a bitmap graphic

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Digital Camera: creates a digital image of real objects


CCD (Charge Coupled Devices): lens of a digital camera focuses
light from the image onto a small image sensor
Photosites: CCD contains a grid of tiny light sensitive diodes
Megapixel: 1 million pixels
Cropping: the process of selecting part of an image like cutting out a
section of a photograph
Resolution Dependent: the quality of an image depends on the
resolution; if you reduce the overall resolution of an image, the
computer eliminates pixels, which reduces the size of the image grid
Pixel Interpolation: process to create new pixels by averaging the
colours of nearby pixels
Pixelated: describes the effect of increasing the size and thus
decreasing the quality of an image
Monochrome Bitmap: displayed by manipulating the pattern of off
and on pixels displayed on the screen
True Colour Bitmap: graphic that uses a full range of colors
Colour Palette: digital version of a kidney shaped artists palette that
holds a selection of colours an artist uses for a particular painting;
allows you to select a group of colours used for a bitmap graphic
Gray scale Palette: uses shades of gray to display images that look
similar to black and white photography
System Palette: collection of colours the operating system uses for
graphics that represent desktop icons and controls
Web Palette: contains a standard set of colours used by Internet web
browsers
Image Compression: any technique that recodes the data in an
image file so that it contains fewer bits

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

Lossless Compression: provides the means to compress a file and


then reconstitute all the data into its original state
Lossy Compression: throws away some of the original data during
the compression process
Run Length Encoding (RLE): replaces a series of similarly coloured
pixels with a binary code that indicates the number of pixels and their
colours
File Compression Utility: uses lossless compression to shrink one or
more files into a single new file

Section C: Vector and 3-D Graphics


Vector Graphic: consist of a set of instructions for recreating a
picture; a vector file contains instructions the computer needs to
create shape, size, position, and color for each object in an image
Digitizing Tablet: device that provides a flat surface for a paperbased drawing and a pen or mouse like puck that you can use to click
the endpoints of each line on the drawing
Gradient: smooth blending of shades from one color to another or
from light to dark
Metafile: graphic that contains both bitmap and vector data
Rasterization: works by superimposing a grid over a vector image
and determining the color for each pixel; process can be carried out by
graphics software, which allows you to specify the output size for the
final bitmap image
Tracing Software: locates the edges of objects in a bitmap image and
converts the resulting shapes into vector graphic objects
SVG (Scalable Vector Graphics): graphics format designed
specifically for Web display that automatically resizes when displayed
on different screens
Flash: file format developed by Macromedia and marketed by Adobe
that has become popular for animations on Web pages

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

lOMoARcPSD

3-D Graphics: stored as a set of instructions; the instructions contain


the locations and lengths of lines that form a wireframe for a threedimensional object
Wireframe: acts in much the same way as the framework of a pop-up
tent; representation of a 3-D object using separate lines, which
resemble wire, to create a model
Rendering: process of covering a wireframe with surface colour and
texture
Ray Tracing: technique for adding light and shadows to a 3-D image

Section D: Digital Video


Digital Video: uses bits to store colour and brightness data for each
video frame
Desktop Video: video that is created on a personal computer and
designed to be played back on a similar device

Distributing prohibited | Downloaded by Fay Kovacs (fayjordan123@gmail.com)

Decision Support System (DSS): helps people make decisions by directly


manipulating data, analyzing data from external sources, generating
statistical projections, and creating data models of various scenarios
Executive Information Systems (EIS): designed to provide senior
managers with information relevant to strategic management activities
based on information from internal and external databases
Decision Model: numerical representation of a realistic situation such as
cash flow model of business that shows how income adds to cash accounts
and expenses deplete those accounts
Decision Query: a question or set of instructions describing data that must
be gathered to make a decision
Expert System: a computer system designed to analyze data and produce
a recommendation, diagnosis, or decision based on a set of facts and rules
Knowledge Base: the collection of facts and rules obtained from experts
that are incorporated into an expert system
Inference Engine: software that can analyze and manipulate a knowledge
base or expert system
Knowledge Engineering: the process of designing rules, entering them
into an expert system, and testing them
Expert System Shell: software tool containing an inference engine and a
user interface that developers use to enter facts and rules for a knowledge
base
Fuzzy Logic: expert system can deal with imprecise data by working with
confidence levels
Neural Network: uses computer circuitry to simulate that way a brain
might process information, learn, and remember

Section B: Systems Analysis


System Development File: information system progresses through several
phases as it is developed, used, and finally retired; referred to as the SDLC

Systems Analysis and Design: focuses on developing information systems


according to the phases of an SDLC
Planning Phase: the first phase of an information system development
project with the goal of creating a Project Development Plan
Project Development Plan: a planning document that is the result of a
planning phase and is reviewed and approved by management
Joint Application Design (JAD): based on the idea that the best
information systems are designed when end users and systems analysts
work together on a project as equal partners
EDI (Electronic Data Interchange): ability to transfer data between
different companies using networks, such as the Internet, which enables
companies to buy, sell, and trade information
JIT (Just In Time): a manufacturing system in which the parts needed to
construct a finished product are produced or arrive at the assembly site just
when they are needed; reduce costs by eliminating substantial warehousing
costs and obsolete parts

PIECES Framework: helps classify problems in an information system 1/


Performance: performance problem means that an information system does
not respond quickly enough to users or takes too long to complete
processing tasks 2/ Information: an information problem means that users
do not receive the right information at the right time in a useable format
3/ Economics: an economics problem means that the system costs too much
to operate or use
4/ Control: a control problem means that information is available to
unauthorized users, or that authorized users are not given the authority to
make decisions based on the information they receive
5/ Efficiency: an efficiency problem means that too many resources are used
to collect, process, store, and distribute information
6/ Service: a service problem means that the system is too difficult or
inconvenient to use
Structured Methodology: focuses on the processes that take place within
an information system
Information Engineering Methodology: a focus on the data an
information system collects before working out ways to process that data
Object Oriented Methodology: treats an information system as a
collection of objects that interact to accomplish tasks

PERT (Program Evaluation and Review Technique): method for


analyzing the time needed to complete each project task and identify the
minimum time needed to complete the total project
WBS (Work Breakdown Structure): breaks a complex task into a series of
subtasks
Gantt Chart: uses bars to show the timing of development tasks as they
occur over time
Project Management Software: an effective tool for planning and
scheduling; helps managers track and visualize the complex interactions
between tasks using tools such as Gantt charts, PERT and WBS
Analysis Phase: produce a list of requirements for a new or revised
information system
System Requirements: are criteria for successfully solving problems
identified in an information system; guide the design and implementation for
a new or updated information system
Success Factors: serve as an evaluation checklist at the end of the
development project
System Requirements Report: describes the objectives for an information
system
Data Flow Diagram (DFD): graphically illustrates how data moves through
an information system
External Entity: person, organization, or device outside the information
system that originates or receives data
Data Store: filing cabinet, disk, or tape that holds data
Process: manual or computerized routine that changes data by performing
a calculation, updating information, sorting a list, or so on
Data Flow: symbolized by an arrow and indicates how data travels from
entities to processes and data stores
UML (Unified Modeling Language): current standard for object-oriented
documentation with tools including case diagrams, sequence diagrams, and
class diagrams

Use Case Diagram: documents that users of an information system and the
functions they perform
Actors: the people who use the system
Use Case: any task an actor performs
Class Diagram: provides the name of each object, a list of each objects
attributes, a list of methods, and an indication of the cardinality between
objects
Sequence Diagram: depicts the detailed sequence of interactions that take
place for a use case
CASE Tool (Computer Aided Software Engineering Tool): software
application designed for documenting system requirements, diagramming
current and proposed information systems, scheduling development tasks,
and developing computer programs

Section C: System Design


Design Phase: SDLC, the project team must figure out how the new system
will fulfill the requirements specified in the Systems Requirement Report
Centralized Processing: data is processed on a centrally located computer
Distributed Processing: processing tasks are distributed to servers and
workstations
Application Development Tool: essentially a type of software construction
kit containing building blocks that can be assembled into a software product
Turnkey System: essentially an information system in a box which
consists of hardware and commercial software designed to offer a complete
information system solution
Decision Support Worksheet: a comparison table used by a project team
to evaluate solutions by assigning a score and a weight to each criterion
Request for Proposal (RFP): document that describes the information
system problem and the requirements for the solution; essentially asks a
vendor to recommend hardware and software for the solution and to
describe the vendors qualifications for implementing the solution

Request for Quotations (RFQ): request for a formal price quotation on a


list of hardware and software; project team issues an RFQ to vendors when it
knows the make and model of the equipment and the titles of the software
packages needed but wants to compare prices from different vendors
Application Specifications: that describes the way the information
systems software should interact with users, store data, process data, and
format reports
Feature Creep: failure to constrain change because new features tend to
creep into the development process with a snowballing effect on other
features, costs, and schedules
Change Requests: detail the scope of a proposed change and can be
evaluated by project team members

Section D: Implementation and Maintenance


Implementation Phase: the project team supervises the tasks necessary
to construct the new information system
Software Customization: process of modifying a commercial application to
reflect an organizations needs
Application Testing: process of trying out various sequences of input
values and checking the results to verify that the application works correctly;
performed in three ways: 1/ unit testing, 2/ integration testing, 3/ system
testing
Unit Testing: ensure that it operates reliably and correctly
Integration Testing: performed to ensure that the modules operate
together correctly
Test Area: place where software testing can occur without disrupting the
organizations regular information system
System Testing: ensures that all hardware and software components work
together correctly
System Documentation: describes a systems features, hardware
architecture, and programming

User Documentation: describes how to interact with the system to


accomplish specific tasks and includes a list of features and instructions for
using them
Procedure Handbook: type of user documentation that contains step-bystep instructions for performing specific tasks
System Conversion: the process of deactivating an old information system
and activating a new one
Direct Conversion: the old information system is completely deactivated
and the new system is immediately activated
Parallel Conversion: avoids some of the risks of direct conversion because
the old system remains in service while some or all of the new system is
activated
Phased Conversion: works well with large, modularized information
systems because the new system is activated one module at a time
Pilot Conversion: works well in organizations with several branches that
have independent information processing systems because the new
information system is activated at one branch at a time
Acceptance Testing: designed to verify that the new information system
works as required
Maintenance Phase: involves day-to-day operation of the system, making
modifications to improve performance, and correcting problems
Quality of Service (QoS): refers to the level of performance a computer
system provides; good quality of service includes reliability, availability, and
serviceability
Quality of Service Metric: technique for measuring a specific quality of
service characteristic
System Operator: task of operating the mainframe or servers on a day-today basis
Systems Programmer: responsibilities include installing new versions of
the operating system and modifying operating system settings to maximize
performance

Help Desk: staffed by a technical support specialist who is familiar with the
information systems software

Section E: Corporate Data Security


Natural Disasters: can completely shut down a computer system, cut off
service to customers, and potentially destroy the system completely
Power Outages: can be caused by natural disasters, overloaded power
grids, planned brownouts, and rolling blackouts
Equipment Failures: can occur in any hardware component of a computer
system and the risk increases as a hardware component ages; MTFB (mean
time between failures)
Human Errors: mistakes made by computer operators; common errors
within an information system include entering inaccurate data and failing to
follow required procedures
Software Failures: can be caused by bugs or flawed software design and
can be deadly
Security Breaches: include stolen data, physical intrusions, and deliberate
sabotage
Acts of War: once affected only computer systems located on battlefronts
but recently civilian areas have become targets; cyber terrorism can also
cause damage by using viruses and worms to destroy data and otherwise
disrupt computer based operations, which include critical national
infrastructures such as power grids and telecommunication services
Malware: can damage just about any computer
Deterrents: reduce the likelihood of deliberate attacks; include security
features like password protection, biometric identification, etc.
Preventive Countermeasures: shield vulnerabilities to render attacks
unsuccessful or reduce its impacts; use of firewalls, etc.
Corrective Procedures: reduce the effect of an attack; use of data
backups, disaster recovery plans, etc.

Detection Activities: recognize attacks and trigger preventive


countermeasures or corrective procedures
Data Center: specialized facility designed to hold and protect computer
systems and data
Disaster Recovery Plan: step-by-step plan that describes the methods
used to secure data against disaster and sets guidelines for how an
organization will recover lost data if and when a disaster occurs

Chapter 11
Section A: File and Database Concepts
Database: collection of information and typically stored as computer files
Data Mining: process of analyzing existing database information to discover
previously unknown and potentially useful information, including
relationships and patterns
Data Warehouse: a repository for data from more than one database
Predictive Analysis: a branch of data mining that focuses on predicting
future probabilities and trends
OLAP (Online Analytical Processing): allow decision makers to look for
relationships between multiple data dimensions
Executive Dashboard Software: provides tools for formulating OLAP
queries and displaying results visually

Unstructured File: every document has a unique structure and contains


different kinds of data; example is a filing cabinet full of folders and papers
Structured File: uses uniform format to store data for each person or thing
in the file
Database Model: underlying structure of a database
Flat File: consists of a single, two-dimensional table of data elements
Field: smallest unit of meaningful information; basic building block for a
structured file or database
Field Name: describes the contents
Variable Length Field: like an accordion as it expands to fit the data you
enter, up to some maximum number of characters
Fixed Length Field: contains a predetermined number of characters
(bytes)
Record: collection of data fields
Record Type: template for a record
Record Occurrence: record that contains data
Relationship: association between data that is stored in different record
types
Cardinality: the number of associations that can exist between two record
types
One-To-Many Relationship: one record is related to many records
Many-To-Many Relationship: one record in a particular record type can be
related to many records in another record type, and vice versa
One-To-One Relationship: a record in one record type is related to only
one record in another record type
Entity Relationship Diagram: graphically depicted relationships between
record types

Hierarchical Databases: allows one-to-one and many-to-many


relationships linked in a hierarchical structure
Network Database: uses a mesh like structure to offer additional capacity
to define many-to-many relationships
Relational Database: stores data in a collection of related tables
Table: sequence of records similar to a flat file
Dimensional Database: organizes relationships over three or more
dimensions
Object Database: stores data as objects, which can be grouped into classes
and defined by attributes and methods
Object Relational Database: describes a variety of technologies that
combine object oriented and relational concepts

Section B: Data Management Tools


Data Dependence: refers to data and program modules being so tightly
interrelated and they become difficult to modify
Data Independence: separating data from the programs that manipulate
data
DBMS (Database Management System): refers to software that is
designed to manage data stored in a database
Database Client Software: allows any remote computer or network
workstation to access data in a database
Database Server Software: designed to manage billions of records and
several hundred transactions every second
Distributed Database: a database is stored on several computers, on
multiple networks, or in different geographical locations
Static Wed Phishing: simple way to display the data in a database by
converting a database report into an HTML document, which can be
displayed as a Web page by a browser

Dynamic Web Phishing: process that generating customized Web pages as


needed or on the fly
Server Side Program: resides on a Web server and acts as an intermediary
between your browser and a DBMS
XML: markup language that allows field tags, data, and tables to be
incorporated into a Web document

Section C: Database Design


Database Structure: the arrangement of fields, tables, and relationships in
the database
Primary Key: field that contains data unique to a record
Data Type: specifies the way data is represented on the disk and in RAM;
determines the way data can be manipulated; data can be broadly classified
as numeric or character
Real Data Type: fields that contain numbers with decimal place prices,
percentages, and so on
Integer Data Type: used for fields that contain whole numbers
Date Data Type: used to store dates in a format that allows them to be
manipulated
Text Data Type: normally assigned to fixed length fields that hold character
data including peoples names, album titles, and so on
Memo Data Type: provides a variable length field into which users can
enter comments
Logical Data Type: used for true/false or yes/no using minimal storage
space
BLOB (Binary Large Object): a collection of binary data stored in a single
field of a database
Hyperlink Data Type: stores URLs used to link directly from a database to a
Web page

Computer Field: calculation that a DBMS performs during processing, and


then temporarily stores in a memory location
Case Sensitive Database: uppercase letters are not equivalent to their
lowercase counterparts
Field Format: template that adds the correct formatting as data is entered
Field Validation Rule: specification that the database designer sets up to
filter data entered into a particular field
Lookup Routine: validates an entry by checking data in a field or database
table
Normalization: helps database designers create a database structure that
minimizes storage space and increases processing efficiency; goal is to
minimize data redundancy
Data Redundancy: amount of data that is duplicated in a database
Sort Order: the order in which records are stored on a disk
Sort Key: one or more fields used to specify where new records are inserted
in a table
Database Index: contains a list of keys, and each key provides a pointer to
the record that contains the rest of the fields related to that key
Report Template: contains the outline or general specifications for a report,
including such elements as the report title, fields to include, fields to subtotal
or total, and report format specifications

Section E: Database Security


Privacy: when data is in a computer database, there is a risk that it can be
viewed by unauthorized individuals or distributed without your permission
Accuracy: data entry errors, update errors, and hacking all add to doubt
about the veracity of database data

Security: data stored in a single database is often sufficient to provide a


criminal with enough information to access your bank account or use your
credit card
Access Control: limits access to systems, such as a computer database;
can block unauthorized users and limit activities of authorized users
Identification and Authentication: determine who can access a database
and the information it contains
Authorization: defines what an authentication user can do
Accountability: tracks what a user did
User Privilege: delineate what activities a user can perform within a
database
Data View: establishes which fields and records a particular user is allowed
to access
Database Audit: procedure that monitors and records user activity within a
database

Chapter 12
Section A: Programming Basics
Code: the instructions that make up a computer program
Computer Programming: encompasses a broad set of activities that
include planning, coding, testing and documenting
Keyword: word with a predefined meaning for the compiler or interpreter
that translates each line of program code into machine language
Parameter: provide instructions that are more detailed for the computer to
carry out
Syntax: keywords and parameters are combined with punctuation according
to a series of rules
Low Level Language: includes commands specific to a particular CPU or
microprocessor family
High Level Language: uses commands words and grammar based on
human languages to provide what computer scientists call a level of
abstraction that hides the underlying low level assembly or machine
language
First Generation Language: machine languages were the first language
available for programming computers
Assembly Language: allows a programmer to use abbreviated command
words, op codes
Second Generation Language: at the time assembly languages were first
introduced, they were hailed as a significant improvement over machine
languages and came to be known as second generation language
Third Generation Languages: high level languages originally conceived in
the 1950s; seemed a major improvement over machine and assembly
language; used easy to remember command words to take place of several

lines of assembly language op codes or lengthy strings of machine language


0s and 1s
Fourth Generation Language: 1969 computer scientists began to develop
highlevel language and more closely resemble human languages
Fifth Generation Language: prolog and other declarative languages
become closely identified with the fifth generation project
Programming Paradigm: way of conceptualizing and structuring the tasks
a computer performs
Multiparadigm Languages: other paradigm languages that support more
than one paradigm
Problem Statement: defines certain elements that must be manipulated to
achieve a result or goal
Assumption: something you accept as true in order to proceed with
program planning
Known Information: problem statement is the information that you supply
to the computer to help it solve a problem
Variable: represents a value that can change
Constant: factor that remains the same throughout a program
Predictive Methodology: requires extensive planning and documentation
up front; allows little room for adaption ad change once specifications for the
software have been completed in the design phase
Agile Methodology: focuses on flexible development and specifications
that evolve as a project progresses
Program Editor: type of text editor specially designed for entering code for
computer programs
VDE (Visual Development Environment): provides programmers with
tools to build substantial sections of a program by pointing and clicking
rather than typing lines of code
Form Design Grid: typical VDE is based on this; programmer manipulates
to design the user interface for a program

Control: screen-based object whose behaviour can be defined by a


programmer
Properties: control can be customized by specifying values for a set of built
in properties; characteristics of an object in a program
Event: an action associated with a form or control
Event Handling Code: for the procedures that specify how the computer
responds to each event
Event Driven Paradigm: a programmer develops a program by selecting
user interface elements and specifying event handling routine
Syntax Error: occurs when an instruction does not follow the syntax rules,
or grammar, of the programming language
Runtime Error: occurs when you run a program, which results from
instructions that the computer cannot execute
Logic Error: error in the logic or design of a program
Debugger: tool to step through a program and monitor the status of
variables, input and output
Remarks: programmers insert documentation into the program code;
identified by language specific symbols
SDK (Software Development Kit): collection of language specific
programming tools that enables a programmer to develop applications for a
specific computer platform
IDE (Integrated Development Environment): type of SDK that packages
a set of development tools into a sleek programming application
Component: prewritten module, designed to accomplish a specific task
API (Application Program Interface): set of application program or
operating system functions that programmers can access from within the
program they create

You might also like