CIS0106 Flashcards

Terms Definitions
802.11
Also known as WiFi
Telecommunications companies, such as local telephone companies, rely on high availability systems to deliver telephone service.
true
trackball
A____is stationary pointing device with a ball on its top or side.
CD-RW
You can erase a ____.
RAM
is not a seconday medium.
platform
When you purchase application software, the package identifies the required_____.
BI
____includes several types of applications and technologies for aquiring, storing, analyzing, and providing access to information to help users make more sound business decisions.
A disaster recovery test plan specifies the actions to be taken to restore full processing operations.
false
controlling
The ___ management activity involves measuring performance and if necessary taking corrective actions.
WLAN
____is a network that connects computers and devices ina limited geographical area without the use of physical wires.
timely
_______information has an age suited to its use.
Cracker
______is someone who assesses a computer or network illegally but has teh intent of destroying data, stealing information, or other malicious action.
virus
___is a potentially damaging computer program that affects, or infects , a computer negatively by altering the way the computer works without the user's knowledge or permission.
Antivirus
____programs protect against worms and Trojan horses.
preliminary
The main purpose of the _________investigation is to determine the exact nature of the problem or improvement and decide whether it is worth pursuing.
microfilm
_____has the longest life expectancy over magnetic disks.
zipped
Compressed files sometimes are called ____ files.
selective backup
______users decide which folders and files to include in a backup.
Some laser printers can print more than 150 pages per minute.
true
IrDA
Some computers and devices use the ____ specification to transmit data wirelessly to each other via infared light waves.
relation
A developer of a relational database refers to a file as a ____.
intergration test
An _______verifies that all programs in an application work with the other application
The following are types of operating system:
stand-alone
network
embedded
CompactFlash
With a storage capacity of 512MB to 100GB, a ____ card is used in digital cameras, PDAs, smart phones, photo printers, audio players, and notebook, and desktop computers.
Each processor on a dual core multicore processor chips generally runs at a faster clock speed that a single core processor
False
thrashing
When an operating system spends much of its time paging, instead of executing application software, it is said to be ____.
OIS
A____ is an information system that enables employees to perfrom tasks using computers and other electronic devices, instead of manually.
Users rotate a portable music player's gamepad to browse through song lists.
false
modem
A ___ connects a communcations channel to a sending or receiving device such as a computer.
Multimedia authoring
____software allows users to combine text, graphics, audio, video, and animation into an interactive application.
E-retail
_____ occurs when retailers use the Web to sell their products and services.
Physical transmission media used in communication include:
twisted pair
coaxial
fiber optic
ATM
An ____ is a self-service banking machine that connects to a host computer through a network.
1980's
The first version of Windows was developed in the mid____.
Private Function
Ex. Private function GO ()
the function can only be used for the current module.
Initializing Variables
Determines the value of a variable
Operating in a manner similar to a copy machine, a dye sublimation printer creates images using laser beam and powered ink, called toner.
false
network architecture
The design of computers, devices, and nedia in a network is sometimes called the ____.
Window
Once loades into memory, a program is displayed in a ___, which is a rectangluar area of the screen that displays data and or information.
touchpad
A ____ is a small flat, rectangular pointing device that is sensitive to pressure and motion.
VAR
A ___ is a company that purchases products from manufacturers and then resells these products to the public - offering additional services with the products.
thermal printer
A ____ generates images by pushing electrically heated pins against heat sensitive paper.
source
A ___ program is the program that contains the language or code to be converted.
RFID
____ is a technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal or a person.
Programmer development
______ is an ongoing process within system development.
MICR reader
A_____ frequently us used by banking industry for check processing.
director's
A ____ committee is a decision making body of the company.
Exposure to a magnet or magnetic field can erase the contents of a card's magnetic stripe.
true
Engineering
In a typical enterprise, _____ is the functional init that is responsible for developing ideas into a product that can be used by customers.
dedicated line
____is a type of always onconnetion that is established between two communications devices.
backup
___is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
A symbolic address
____is a meaningful name that identifies a storage location.
Copyright
______laws gives the public fair us to copyrighter material.
GIGO
___ is a computing phrase that points out the accuract of a computer's output depends on teh accuracy of the input.
megabyte
A ____ is equal to approximately 1 billion bytes.
Memory stores
the operating system and other systems software that control or maintain the computer and its devices, applicaton programs that carry out a specific task, and the data being processed by application programs and the resulting information.
String Data Type
-Sequence of characters enclosed in double quotes.
Ex. "BOB"
-Declaration
Ex. Dim StrFname as String
-Assignment
Ex. StrLname = "supercool"
Variable Declarations
1. Arent required but a good progamming.
2. Makes it easier to understand
Option Explicit characteristics
-Top of all modules and forms
-requires all variables to explicity declared
- it will omit a new variable that is created,  but requires formal initalizing.
-improves memory management.
Public Function
Ex. Public Function GO ()
Function can be used on multiple modules.
pointing device
A____ allows user to control a pointer on the screen.
operating system
A____ is a set of programs containing instructions that coordinate all the activities among hardware resources.
Feasibility
___ is a measure of hw suitable the development of a system will be to the company.
data mart
A smaller version of a data warehouse, is a ____, which contains a database that helps a specific group make decisions.
L2 cache
___ is slightly slower than L1 cache but has a much larger capacity.
quarantine
_____is a separate area of a hard disk that holds the infected file until the infection can be removed.
A CRT monitor costs more than a LCD monitor.
False
Video editing software
_____lets users create video and allow the edit of audio tracks.
icon
A___ is a small image displayed on the screen that represents a program, a document, or some other object.
query language
A ___ consists of simple, English like statement that allows users to specifiy the data to display, print,or store.
cold boot
When turning on a computer that has been powered off completely, you are performing a ____.
RSS 2.0
One application of XML is the ____ specification.
joystick
A___ is a vertical lever mounted on a base.
flatbed scanner
A____ works in a manner similar to a copy machine excepts it creates files of the document in memory instead of a paper copy.
RSI
A ___ is an injury or disorder of the muscle, nerves, tendons, ligaments, and joints.
embedded operating system
The operating system on most PDAs and small devices, is called_____ and resides on the ROM chip.
USB Port
A ____ can connect up to 127 different peripherals together with a single connector type.
String Concatenation
Multiple strings can be joined by a & sign.
All of the following are flash memory devices:
Compact Flash
Secure Digital
Memory Stick
chain letter
A virus hoax often is in the form of a ____.
Whole # data type and ranges
Byte- 0 to 255
Integer- -32,768 to 32,768
Long- -2,147,483,648 to 2,147,483,648
/ 81
Term:
Definition:
Definition:

Leave a Comment ({[ getComments().length ]})

Comments ({[ getComments().length ]})

{[comment.username]}

{[ comment.comment ]}

View All {[ getComments().length ]} Comments
Ask a homework question - tutors are online