CSCI TEST TWO Flashcards

Terms Definitions
2.5g
confidentiality service
Try Block


		Contains
		code where something could possibly go wrong
		
			If
			it does go wrong, we throw an
			exception
		
	

Layout Manager

arranges
		the items(labels) you add to JFrame with JLabel according to
		certain rules
		objects
		that you add to a container class are arranged by this
	

PrinterWriter class

class
		preferred stream class for writing to a text file
	

Predefined Exception Classes


		Java
		has predefined exception classes within Java Class Library
		
		Can
		place method invocation in try
		block
		
		Follow
		with catch block for this type
		of exception

		Example
		classes
		
			BadStringOperationException
			
			ClassNotFoundException
			
			IOException
			
			NoSuchMethodException
		
	

	

local variable

A
		variable declared within a method
	


WinSSH


SSH client for windows

Output
result produced by a computer
Consumer advocates recommend using person-to-person payment services with caution & keeping your account balances low.
TRUE
classpath element

The elements of the
		classpath are platform specific OS directory names (with \\\\
		or / separators) or jar file names 
		
		The CLASSPATH is an
		environment
		variable that tells the Java compiler javac.exe
		where to look for class files to import or java.exe
		where to find class files to interpret. 
		
	

instance variable

confined
		to an object of a class
	

Computer _____ is the discovery, collection, and analysis of evidence found on computers and networks.
forensics
Port
An interface through which external devices are connected to the computer.
Network (server)
provides communications and routing services to
allow multiple computers to share data, software and peripheral
devices.
What is a behaviorally related sequence of steps (a scenario), both automated and manual, for the purpose of completing a single business task?
use-case
javac task

Compiles a Java source tree.
		The source and destination directory will be recursively
		scanned for Java source files to compile. Only Java files that have
		no corresponding .class file or where
		the class file is older than the .java
		file will be compiled.
	

The developer of a relational database refers to a file as a(n) ____.
Relation
With a(n) ____, users create a computerized database; add change and delete data in the database; sort and retrieve data from the database; and create forms and reports from the data in the database.
DBMS
A(n) ____ gives authors and artists exclusive rights to duplicate, publish, and sell their materials.
Copyright
____ transmits at fast speeds on ezisting standard copper telephone wiring, but requires that the user's location and the telephone company's modem be located within a certain distance of each other.
DSL
Microphone
A device for capturing sound waves (such as voice) and transferring them to digital format on a computer.
Presentation Software
An application program for creating dynamic slide shows, such as Microsoft Powerpoint or Corel Presentations.
Programs
Instruction set that provides a means for users to interact with and use the computer, all without specialized computer programming skills.
Floppy Disk
A portable 3.5-inch storage format, with a storage capacity of 1.44 megabytes (MB).
microsoft transcriber
another popular notation system for entering data into a pda.
Aligning HTML to center
Title of my page
optical storage
stores data as microscopic light
and dark spots on the disk surface (CDs & DvDs)
Basic Input Devices
Keyboard, Mouse, touch screen, etc.
A key characteristic of viruses is their ability to lurk in a comp for days or months quietly replicating themselves.
TRUE
Java class

A
class is the blueprint from which individual objects are
created

Types of wired home networks include all of the following ___, _____, ____.
-Ethernet
-Powerline Cable
-Phoneline 
Two examples of ______ are cable television lines and telephone lines.
Communications channels
Yes/No (also called ____) is a common data type that includes only the values Yes or No (or True or False).
Boolean
Laser Printers
A nonimpact printer known for quick and quiet production and high-quality printouts; it uses laser beams to make marks on paper.
Financial Planning Software
Programs for managing finances, such as Intuit's Quicken and Microsoft Money, which include electronic checkbook registers and automatic bill payment tools.
Flash Drives
Drives that plug into a universal serial bus (USB) port on a computer and store data digitally. Also called USB drives.
iphone sdk
the software development kit used to make the iphone a platform for new programs; used for writing new software and programs for the iphone.
UNIX
developed in the late 1960's at Bell Labs
Color depth
the number of colors a monitor
can display
o It is called “Has A” or “A Part Of” type of relationship in structural modeling• Car has an engine• Patient has a medical history
• Aggregation
The more pixels in a bitmap, the fewer bits needed to store the file.
FALSE
tar command

Create tape archives and add or extract files.
	

____ is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information.
Phishing
A _____ network is a network topology that consits of a single central cable, to which all computers and other devices connect.
A bus
  A(n) ____ is an adapter card, PC Card, or flash card that enables a computer or devies to access a network.
NIC
Accessible information _______.
is available when a decision maker needs it.
A data ____ is a huge database that stores and manages the data required to analyze historical and current transactions.
Warehouse
Sound Card
An expansion card that attaches to the motherboard inside the system unit that enables the computer to produce sounds.
Word Processing Software
Programs used to create and edit written documents such as papers, letters, and resumes.
Memory Card Readers
An external device for reading flash memory cards.
data mining
the process by which great amounts of data are analyzed and investigated to spot significant patterns or trends within the data that would otherwise not be obvious.
phishing
a type of email scam designed to steal someone's identity.
LAN – local area network
a connection between personal computers within a limited
geographical area, most often a single building
What are the two types of responsibilities that classes have?
knowing and doing
Characteristics of System Software
1) Hides complex and unimportant details of the internal structure
2) presents important information in a way that is easy to understand
3) allows user to access machine resources in a simple and efficient way
4) provides secure and safe environment in which to operate
A _____ is the smallest unit of data a computer can process.
bit
____, which provides encryption of all data that passes etween a client and a server, requires that both the client and the server have digital certificates
Secure Sockets layer (SSL)
Enterprise Resources Planning (ERP) Systems
Software that controls "back office" operations and processing functions such as billing, production, inventory management, and human resources management. ERP Systems are implemented by third-party vendors and matched directly to the specific needs of a company.
Memory Bound
A system that is limited to how fast it can send data to the central processing unit (CPU) because there's not enough random access memory (RAM) installed.
Storage
is the area where data can be left on a
permanent basis when it is not immediately
needed for processing (hard drive, cd, thumbdrive).
____ is a computer phrase that points out the accuracy of a computer's output depends on the accuracy of its input.
Garbage in, garbage out
Arithmetic Logic Unit (ALU)
The part of the CPU that is responsible for performing all the arithmetic calculations (addition, subtraction, multiplication, and division). Additionally, the ALU makes logic and comparison decisions, such as comparing items to determine if one is greater than, less than, equal to, or not equal to another.
A print server is a dedicated server that _____. 
Manages printers and print jobs.
GUI (graphical user interface)
allow
you to use a mouse to click or double click on a menu option or icon
to run programs
A T3 line is ____.
equal in speed to 28 T1 lines but quite expensive.
A voice mailbox is a(n) _____ in a voice mail system.
Storage location on a hard disk
In a relational database, each row ____.
has a primary key and each column has a unique name
/ 68
Term:
Definition:
Definition:

Leave a Comment ({[ getComments().length ]})

Comments ({[ getComments().length ]})

{[comment.username]}

{[ comment.comment ]}

View All {[ getComments().length ]} Comments
Ask a homework question - tutors are online