Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
93 Cards in this Set
- Front
- Back
application program
|
Programs help solve real-world problems
|
|
array
|
collection of components, all of the same type, ordered n dimensions (n>=1); each component’s position within that dimension
|
|
artificial intelligence
|
the study of computer systems that model and apply the intelligence of the human mind
|
|
assignment statement
|
a statement that stores the value of an expression into a variable
|
|
back door
|
A program feature that gives special and unauthorized access to a computer system to anyone who knows its exists
|
|
bandwidth
|
The number of bits or bytes that can be transmitted from one place to another in a fixed amount of time
|
|
binary file
|
a file that constrains data in a specific format, requiring a special interpretation of its bits
|
|
binary search
|
search algorithm for sorted lists that involves diving the list in half and determining, by value comparison, whether the items would be in the upper or lower half; the process is performed repeatedly list
|
|
biometrics:
|
Using human characteristics such as fingerprints, retina patterns, or voice patterns to identify users and control access
|
|
Boolean
|
a sequence of identifiers separated by compatible operators, that evaluates to true or false
|
|
bytecode
|
A standard machine language into which Java source code is compiled
|
|
client/server model
|
A distributed approach in which a client makes requests of a server and the server responds
|
|
compiler
|
A program that translates a high-level language program into machine code
|
|
CPU scheduling
|
The act of determining which process in memory is given access to the CPU so that it may execute
|
|
cryptography
|
The field of study related to encoded information
|
|
declaration
|
A statement that associates an identifier with a variable, and action, or some other entity within the language that can be given a name so that the programmer can refer to that items by name.
|
|
denial-of-service
|
an attack on a network resource that prevents authorized users from accessing the system
|
|
digital certificate
|
a representation of a sender’s authenticated public key used to minimize malicious forgeries
|
|
digital signature
|
data that is appended to a message, made from the message itself and the sender’s private key, to ensure that authenticity of the message
|
|
directory tree
|
a structure showing the nested directory organization of the file system
|
|
disk scheduling
|
the act of deciding which outstanding requests for disk I/O to satisfy first
|
|
domain name
|
The part of a hostname that specifies a specific organization or group
|
|
download
|
Receiving data on your home computer from the Internet
|
|
dynamic-partition
|
memory management technique in which memory is divided into partitions as needed to accommodate programs
|
|
electronic-commerce
|
the process of buying and selling products and services using the WWW
|
|
encryption
|
the process of converting plaintext into hypertext
|
|
entity-relationship diagram
|
a graphical representation of ER model
|
|
expert system
|
a software system based on the knowledge of human experts
|
|
FIFO
|
First In First Out “Queue
|
|
file type
|
the specific kind of information contained in a file, such as a Java Program or a Microsoft Word document
|
|
firewall
|
a gateway machine and its software that protect a network by filtering the traffic
|
|
fixed-partition
|
the memory management technique in which memory is divided into a specific number of partitions into which programs are loaded
|
|
gateway
|
a node that handles communication between its LAN and other networks
|
|
FIFO
|
First In First Out “Queue
|
|
file type
|
the specific kind of information contained in a file, such as a Java Program or a Microsoft Word document
|
|
firewall
|
a gateway machine and its software that protect a network by filtering the traffic
|
|
fixed-partition
|
the memory management technique in which memory is divided into a specific number of partitions into which programs are loaded
|
|
gateway
|
a node that handles communication between its LAN and other networks
|
|
graph
|
a data structure that consists of a set of nodes and a set of edges that relates the nodes to each other
|
|
inference engine
|
the software that processes rules to draw conclusions
|
|
internet service provider (ISP)
|
a company providing access to the Internet
|
|
interpreter
|
a program that inputs a program in a high-level language and directs the computer to perform the actions specified in each statement
|
|
IP address
|
an address made up of four numeric values separated by dots that uniquely identify a computer on the Internet
|
|
leaf node
|
a tree node that has no children
|
|
LIFO
|
Last In First Out “Stacks”
|
|
logical address
|
a reference to a stored value relative to the program making the reference
|
|
malicious code
|
a computer program that attempts to bypass appropriate authorization and/or perform unauthorized functions
|
|
memory management
|
the act of keeping track of how and where programs are loaded in main memory
|
|
multiprogramming
|
the technique of keeping multiple programs in main memory at the same time, competing for the CPU
|
|
natural language
|
Languages that human beings use to communicate such as English
|
|
node
|
the building blocks of dynamic structures, each made up of a component (the data) and a pointer (the link) to the next node
|
|
object-oriented paradigm
|
a technique for developing software in which the solution is expressed in terms of objects—self-contained entities composed of data and operations on that data that interact by sending messages to one another
|
|
open system
|
a system that is based on a common model of network architecture and an accompanying suite of protocols
|
|
operating system
|
system software that manages computer resources and provides and interface of system interaction
|
|
packet
|
a unit of data sent across a network
|
|
page
|
a fixed-size portion of a process that is stored into a memory frame
|
|
physical
|
address in actual address in the main memory device
|
|
pop
|
removing an item from the stack
|
|
preemptive scheduling
|
CPU scheduling that occurs when the operating system decides to favor another process, preempting the currently executing process
|
|
process
|
the dynamic representation of a program during execution
|
|
proprietary system
|
a system that uses technologies kept private by a particular commercial vendor
|
|
protocol
|
a set of rules that define how data is formatted and processed on a network
|
|
pseudocode
|
a mixture of English statements and control structures that can easily be translated into a programming language
|
|
public-key cryptography
|
an approach to cryptography in which each user has two related keys, one public and one private
|
|
push
|
Adding an item to the stack
|
|
query
|
a request for information submitted to a database
|
|
queue
|
An abstract data type in which items are entered at one end and removed from the other end
|
|
relational model
|
a database model in which data and the relationships among them are organized into tables
|
|
relative
|
a path that begins at the current working directory
|
|
repeater
|
a network device that strengthens and propagates a signal along a long communication line
|
|
risk analysis
|
determining the nature and likelihood of the risks to key data
|
|
root directory
|
the topmost directory, in which all others are contained
|
|
root node
|
The beginning of the tress, unique starter node
|
|
router
|
a network device that directs a packet between networks toward its final destination
|
|
rule-based system
|
a software system based on a set of if-then rules
|
|
schema
|
a specification of the logical structure of data in a database
|
|
simulation
|
developing a model of a complex system and experimenting with the model to observe the result
|
|
smart card
|
a card with an embedded memory chip used to identify users and control access
|
|
spoofing
|
an attack on a computer system in which a malicious user masquerades an authorized user
|
|
SQL
|
a comprehensive relational database language for data management and queries
|
|
stack
|
An abstract data type in which accesses are made at only one end
|
|
strong typing
|
Each variable is assigned a type, and only values of that type can be stored in the variable
|
|
table
|
a collection of database records
|
|
text file
|
a file that contains characters
|
|
thrashing
|
inefficient processing caused by constant page swapping
|
|
time slice
|
the amount of time given to each process in the round-robin CPU scheduling algorithm
|
|
timeshare
|
a system in which CPU time is shared among multiple interactive users at the same time
|
|
upload
|
sending data from your home computer to a destination on the Internet
|
|
variable
|
a location in memory, referenced by an identifier, that contains data value
|
|
virtual machine
|
the illusion created by a timesharing system that each user has a dedicated machine
|
|
voice recognition
|
using a computer to recognize the words spoken by a human
|
|
voice synthesis
|
using a computer to create the sound of human speech
|
|
working directory
|
the currently active subdirectory
|