CSCI Flashcards

Terms Definitions

 
 
 
 
 
 
 
 
 
 
 
 
 
___, like that shown, is an unsolicited e-mail message or newsgroup posting sent o many recipients or newsgroups at once.
Spam
javac command

compiles
		program
	

ActionListener

listens
		for events from the applet
	

mutator method

sets
		a value
	

Binary File

files
		whose contents must be handled as sequences of binary digits
	

constructor

a
		method that is called when a new object is created. Called
		automatically whenever you create an object using the new operator
	

IP-Internet Protocol
Provides devices with unique
addresses
Typically infected attachments look like text files.
FALSE
assignment statement

an
		order telling the computer to change the value stored in the
		variable in the left-hand side of the assignment operator to the
		value of the expression on the right-hand side
	

Flushing

a
method common in I/O classes that effectively does all the normal
file or stream close processing, but leaves the file open, or, if you
prefer, conceptually closes then instantly reopens the file/stream.
flush makes sure everything you have written so far is committed to
the hard disk, and the expanded file length is also committed to the
disk directory, with the updated lastModified timestamp committed
too.

Personal computers, display devices, and printers should comply with guidelines of the ____ program.
ENERGY STAR
____ is/are not considered spyware because aa user knows it/they exist(s).
Cookies
Videconferencing
Technology that enables a person sitting at a computer and equipped with a personal video camera and a microphone to transmit video and audio across the Internet (or other communications medium). All computers participating in a videoconference need to have a microphone and speakers installed so that participants can hear one another.
Multiprocessing
divides the work between
all the processors
Resolution
the number of horizontal and
vertical pixels that a screen can display
What represents extension of the functionality of the use case to incorporate optional behavior?
 Extend
pager

A pager is a program for
		displaying the contents of a text file one screenful at a time. The
		most commonly used pager programs are more and
		less. 
		
	

methods or behaviors
member functions of a class
A checkout clerk with ____ privileges to the e-mail addresses in a discount warehouse database could view the addresses but not change them.
read-only
Content ___ is the process of restricting access to certain material on the Web.
filtering
_____ is a newer network standard developed by IEEE that specifies how wireless devices communicate over the air in a wide area.
WiMAX
____ allows users to send graphics, pictures, video clips, and sound files, as well as short text messages to other smart phones, PDAs, or computers.
MMS
Active-Matrix Displays
With an LCD monitor using active-matrix technology, each pixel is charged individually, as needed. The result is that an active-matrix display produces a clearer, brighter image than a passive-matrix display.
Accounting Software
An application program that helps small business owners manage their finances more efficiently by providing tools for tracking accounting transactions such as sales, accounts receivable, inventory purchases, and accounts payable.
Software
The set of computer programs or instructions that tells the computer what to do and enables it to perform different tasks.
Head Crash
Impact of read/write head with magnetic platter of the hard disk drive that often results in data loss.
graffiti
one of the most popular notation systems for entering data into a personal digital assistant.
pipelining
a processor can start to execute
an instruction before the previous one is
finished
The internet is the largest example of a LAN.
FALSE
chmod command

Changes the permission of a file
	

A(n) ____ verifies that a required field contains data.
Completeness check
A(n) ____ check is a validity check that determines whether a number is within a specified group of numbers
Range
With a(n) ____, users choose which folders and files to include in a backup.
Selective Backup
A(n) ____ is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.
Cracker
Ink-Jet Printers
A nonimpact printer that sprays ting drops of ink onto the paper.
Video Card
An expansion card that is installed inside a system unit to translate binary data (the 1s and 0s your computer uses) into the images viewed on the monitor.
Full Installation
Installing all the files and programs from the distribution CD to see the computer's hard drive.
Sectors
A section of a hard disk drive platter, wedge-shaped from the center of the platter to the edge.
hardware
any part of the computer you can physically touch.
Access time
average time it takes a
computer to locate data on the storage media
and read it
digital divide
gap between people who
have access to technology and those who do not
What is Anthropomorphism?
pretending that classes have human characteristics
Trigger events are often keyed to a specific date.
TRUE
ANT Task

a piece of code that can
be executed

A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
RSI
_____ is a type of DSL that supports faster transmission rates when receiving data (the downstream rate) than when sending data (then upstream rate).
ADSL
To help reduce the chance of ____, physical controls such as locked doors and cables usually are adequate to protect equiptment.
hardware theft
Timely information _______.
has an age suited to its use
Windowns Key
A function key specific to the Windows operating system. Used alone, it brings up the start menu; however, it's used most often in combination with other keys as shortcuts.
System Software
The set of programs that enables a computer's hardware devices and application software to work together; it includes the operating system and utility programs.
System Evaluation
The process of looking at a computer's subsystems, what they do, and how they perform to determine whether the computer system has the right hardware components to do what the user ultimately wants it to do.
database schema
how you represent your business in a bunch of tables
proxy server
acts as a go-between for computers on the internal network and the external network (the internet).
Storage capacity
the maximum amount of
data that can be stored on a particular medium
What is when the event that triggers the use case execution is time?
• Temporal trigger
Define Operating System
The program that controls the overall operation of the computer. communicates with users, determine what they want, and activates other system programs, applications, packages, or user programs to carry out their requests.
Useful information _____.
has meaning to the person who reeives it.
_________ can serve as sending and receiving devices in a communications system.
-Mainframe computers and servers-Desktop computers and notebook computers-Tablet PCs and PDAs
Web Page Authoring Software
Programs you can use to design interactive Web pages without knowning any Hypertext Markup Language (HTML) code.
Ethernet Port
A port that is slightly larger than a standard phone jack and transfers data at speeds of up to 1,000 megabits per second. It is used to connect a computer to a cable modem or a network.
private key
one half of a pair of binary files that needed to decrypt an encrypted message. the private key is kept only by the individual who created the key pair and is never distributed to anyone else. the private key is used to decrypt messages created with the corresponding public key.
Data transfer rate
the amount of data that can
be moved per second from the storage medium
to the computer
A(n) ___ tests the data in two or more associated fields to ensure that the relationship is logical.
Consistancy check
File Allocation Table (FAT)
An index of all sector numbers that the hard drive stores in a table to keep track of which sectors hold which files.
OS communicates with user through a system request. List 5 types of systems programs that handle these requests
1) language translators
2) Memory managers
3) Information managers
4) Scheduler
5) Utilities
When compared with a file processing system, a database offers all of the following _____.
- reduced data redundancy
- easier access and shared data
- reduced development time 
NAN – neighborhood area network
type of connection is within a limited range and usually spread
over several buildings, like what is found in coffee shops and book
stores
using a value parameter for structure
can slow down a program and waste space
Deleting un-needed files ____ storage space.
Reduces the size of files and frees up
The DA does all of the following:
- Decide on the proper placement of fields
- Define the relationships among data
- Identify users' access privileges 
A network like the one shown can span a _____ distance than a bus network but is more _____.
Larger distance, but it is more difficult.
/ 71
Term:
Definition:
Definition:

Leave a Comment ({[ getComments().length ]})

Comments ({[ getComments().length ]})

{[comment.username]}

{[ comment.comment ]}

View All {[ getComments().length ]} Comments
Ask a homework question - tutors are online