Antivirus (Ch7)
is a type of utility software that looks for and eliminates viruses, trojans, worms, and other malware
ASCII (Ch1)*
[American Standard Code for Information Interchange]
Authentication (Ch7, lecture)
such as passwords, PINs, and fingerprint scanners, are the first line of defense against data thieves and snoopers.
Bitmap formats (Ch1)*
formats (know sizes)
Blogosphere (Ch5)
all the blogs and their interconnections—is influential; blogs and other Internet-based news outlets have the potential to reach mass audience
Boolean Operators (Ch10)*
- used for true/false and yes/no data
Code (Ch11)
source code: human-readable version of a program created in a high-level language by a programmer
program code: able to use a text editor, program editor, or graphical user interface to code computer programs
Common Carrier (Ch8)
(google)
entity who provides wired/wireless communication services to general public for a fee
Compiler (Ch11)
compiler converts all the statements in a program in a single batch, and the resulting collection of instructions, called object code, is placed in a new file
Compression (Ch1)*
Cookie (Ch4)
is a small chunk of data generated by a Web server and stored as a text file in memory or on disk
Web sites use cookies to:
Databases (Ch10)
Operational databases:
-collect, modify, and maintain data on a daily basis
Analytical databases:
collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions
object database:
-stores data as objects, which can be grouped into classes and defined by attributes and methods
Relational databases:
-are organized according to a schema, which is a blueprint for its structure; rows, columns, and tables of a database are part of its schema
Data Warehouse (Ch10)
.
Decision Table (Ch11)*
-a tabular method for visualizing and specifying rules based on multiple factors
Declarative Paradigm (Ch11)
describes aspects of a problem that lead to a solution
Disaster Recovery Plan (Ch9)
is a step-by-step description of the methods used to secure data against disaster and a set of guidelines for how an organization will recover lost data and resume operations if and when a disaster occurs
Disk Partition (Ch6)
is a section of a hard disk drive that is treated as a separate storage unit; most hard drives are configured with a single partition that contains the OS, programs, and data.
Domain (Ch3)*
Email protocols (Ch5)
Encapsulation (Ch11)*
(google) referring to networking, taking data from one protocol and translating it into another protocol, so the data can continue across a network
(edit) bundling of data with the methods that operate on that data. occurs only in object oriented.
Errors (Ch11)
runtime error:
occurs when a program runs instructions that the computer can’t execute
logic error:
is a type of runtime error in the logic or design of the program
syntax error:
occurs when an instruction does not follow the syntax rules of the programming language
Fact (Ch11)*
is a statement that provides the computer with basic information for solving a problem
File naming conventions (Ch6)*
When saving a file, you must provide a valid file name that adheres to specific rules.
CAN USE: A–Z (letters) 0–9 . (period) _ (underscore) - (dash)
CANT USE: < (less than) > (greater than) \: (colon) / (forward slash) \ (backslash) | (vertical bar) ? ( question mark) * (asterisk) " (double quote)
Firewall (Ch7)
a device or software that is designed to block unauthorized access while allowing authorized communications