Tmk 3100(Key Term)

40
COMPUTER SYSTEM AND APLICATION TMK 3100 (KEY TERM) CHAPTER 1 : INTRODUCTION TO THE WORLD OF COMPUTER KEY TERM MATCHING Match each key term on the left with the definition on the right that best describes it. A. Web Site B. microcomputer C. mainframe computer D. notebook computer E. midrange server F. E-mail address G. uniform resource locator (URL) H. computer I. Web browser J. domain name K. operating system L. mobile device M. processing N. hyperlink O. output P. storage Q. supercomputer R. software S. Internet 1. A collection of related Web pages usually belonging to an organization or individual. 2. Text or an image located on a Web page or other document that is linked to a Web page or other type of document. 3. The fastest, most expensive, and most powerful type of computer. 4. The process of presenting the results of processing; can also refer to the results themselves. 5. Performing operations on data that has been input into a computer to convert that input to output. 6. The physical parts of a computer system, such as the keyboard, monitor, printer, and so forth. 7. A very small device, usually based on a wireless phone, that has some type of built-in computing or Internet capability. 1

Transcript of Tmk 3100(Key Term)

Page 1: Tmk 3100(Key Term)

COMPUTER SYSTEM AND APLICATIONTMK 3100 (KEY TERM)

CHAPTER 1 : INTRODUCTION TO THE WORLD OF COMPUTER

KEY TERM MATCHING

Match each key term on the left with the definition on the right that best describes it.

A. Web SiteB. microcomputerC. mainframe computerD. notebook computerE. midrange serverF. E-mail addressG. uniform resource locator (URL)H. computerI. Web browserJ. domain nameK. operating systemL. mobile deviceM. processingN. hyperlinkO. outputP. storageQ. supercomputerR. softwareS. InternetT. hardware

1. A collection of related Web pages usually belonging to an organization or individual.

2. Text or an image located on a Web page or other document that is linked to a Web page or other type of document.

3. The fastest, most expensive, and most powerful type of computer.

4. The process of presenting the results of processing; can also refer to the results themselves.

5. Performing operations on data that has been input into a computer to convert that input to output.

6. The physical parts of a computer system, such as the keyboard, monitor, printer, and so forth.

7. A very small device, usually based on a wireless phone, that has some type of built-in computing or Internet capability.

8. A fully functioning portable PC that opens to reveal a screen and keyboard.

9. The largest and most well-known computer network, linking millions of computers all over the world.

10. An Internet address, usually beginning with http://, that uniquely identifies a Web page.

1

Page 2: Tmk 3100(Key Term)

11. A computer used in large organizations (such as hospitals, large businesses, and colleges) that need to manage large amounts of centralized data and run multiple programs simultaneously.

12. A type of system software that enables a computer to operate and manage its resources and activities.

13. The operation of saving data, programs, or output for future use.

14. A text-based Internet address used to uniquely identify a computer on the Internet.

15. The instructions, also called computer programs, that are used to tell a computer what it should do.

16. An Internet address consisting of a username and computer domain name that uniquely identifies a person on the Internet.

17. A medium-sized computer used to host programs and data for a small network.

18. A programmable, electronic device that accepts data input, performs processing operations on that data, and outputs and stores the results.

19. A program used to view Web pages.

20. A type of computer based on a microprocessor and designed to be used by one person at a time; also called a personal computer or PC.

CHAPTER 2 : PROCESSING AND MEMORY

KEY TERM Match each key term on the left with the

2

Page 3: Tmk 3100(Key Term)

MATCHING definition on the right that best describes it.

A. machine languageB. UnicodeC. parallel processingD. portE. ASCIIF. byteG. cache memoryH. expansion slotI. busJ. Universal Serial BusK. random access memory (RAM)L. registersM. central processing unit (CPU)N. system unitO. motherboardP. binary numbering systemQ. control unitR. arithmetic logic unit (ALU)S. nanotechnologyT. system clock

1. High-speed memory built into the CPU that temporarily stores data during processing.

2. The chip located inside the system unit of a computer that performs the processing for a computer.

3. A location on the motherboard into which expansion cards are inserted.

4. The part of the CPU that coordinates its operations.

5. A connector on the exterior of a PC's system unit to which a device may be attached.

6. A fixed-length, binary coding system widely used to represent text-based data for computer processing on many types of computers.

7. The numbering system that represents all numbers using just two symbols (0 and 1).

8. The main box of a computer that houses the CPU, motherboard, memory, and other devices.

9. The timing mechanism within the computer system that synchronizes the computer's operations.

10. Chips connected to the motherboard that provide a temporary location for the computer to hold data and program instructions while they are needed.

11. A universal bus used to connect up to 127 peripheral devices to a computer without requiring the use of additional expansion cards.

12. A processing technique that uses multiple processors simultaneously in a

3

Page 4: Tmk 3100(Key Term)

single computer, usually to process a single job as fast as possible.

13. The science of creating tiny computers and components by working at the individual atomic and molecular levels.

14. A binary-based language for representing computer programs that the computer can execute directly.

15. The main circuit board of a computer, located inside the system unit, to which all computer system components connect.

16. A group of 8 bits; in ASCII and EBCDIC, it holds a single character of data.

17. An electronic path on the motherboard or within the CPU or other computer component along which data is transferred.

18. A group of fast memory chips located on or near the CPU to help speed up processing.

19. The part of the CPU that performs logical operations and integer arithmetic.

20. A coding system for text-based data using any written language.

CHAPTER 3 :STORAGE

KEY TERM MATCHING

Match each key term on the left with the definition on the right that best describes it.

A. trackB. smart cardC. disk cacheD. optical discE. folder

1. A type of storage medium read from and written to using a laser beam.

2. A low-capacity, removable magnetic disk made of flexible plastic

4

Page 5: Tmk 3100(Key Term)

F. floppy diskG. DVD-ROMH. storage deviceI. sectorJ. magnetic tapeK. CD-RL. flash memory driveM. flash memory cardN. remote storageO. RAIDP. hard disk driveQ. volatileR. nonvolatileS. fileT. storage medium

permanently sealed inside a hard plastic cover.

3. Describes a storage medium that retains its content when the power is shut off.

4. A plastic tape with a magnetizable surface that stores data as a series of magnetic spots; typically comes in a cartridge.

5. A credit card-sized piece of plastic containing a chip and other circuitry into which data can be stored.

6. A dedicated part of RAM used to store additional data adjacent to data retrieved during a disk fetch to improve system performance.

7. A recordable CD.

8. A named place on a storage medium into which files can be stored to keep the files stored on that medium organized.

9. A concentric path on a disk where data is recorded.

10. A pie-shaped area on a disk surface.

11. A piece of hardware, such as a floppy drive or CD drive, into which a storage medium is inserted to be read from or written to.

12. A small drive that usually plugs into a PC's USB port and contains flash memory media.

13. An optical disc, usually holding 4.7 GB, that can be read from, but not written to, by the user.

14. The part of a storage system where data is stored, such as a floppy disk or CD disc.

5

Page 6: Tmk 3100(Key Term)

15. Something stored on a storage medium, such as a program, document, or image.

16. A storage system consisting of one or more metal magnetic disks permanently sealed with an access mechanism inside its drive.

17. A storage method that uses several small hard disks in parallel to do the job of a larger disk.

18. A small, rectangular flash memory media, such as a CompactFlash or Secure Digital card.

19. A storage device that is not directly a part of the PC being used, such as network storage or online storage.

20. Describes a medium whose content is erased when the power is shut off.

CHAPTER 4 : INPUT AND OUTPUT

KEY TERM MATCHING

Match each key term on the left with the definition on the right that best describes it.

A. mouseB. RFID tagC. touch screenD. CRT monitorE. barcodeF. keyboardG. scannerH. electronic penI. digital cameraJ. photo printerK. ink-jet printerL. laser printerM. input deviceN. flat-panel displayO. voice-input system

1. A type of flat-panel display that uses emissive organic material to display brighter and sharper images.

2. An input device that is used to write electronically on the display screen; also called a stylus or digital pen.

3. A display device that projects images onto a display screen using a technology similar to the one used with conventional TVs.

4. An input device that takes pictures and records them as digital data (instead of film or videotaped) images.

5. A slim type of display device that

6

Page 7: Tmk 3100(Key Term)

P. OLED displayQ. speakersR. optical character recognition (OCR)S. pixelT. biometrics

uses electronically-charged chemicals or gases instead of an electron gun to display images.

6. An output device that uses toner powder and technology similar to that of a photocopier to produce images on paper.

7. The smallest colorable area in an electronic image, such as a scanned document, digital photograph, or image displayed on a display screen.

8. A common pointing device that the user slides along a flat surface to move a pointer around the screen and clicks its buttons to make selections.

9. The ability of a scanning device to recognize handwritten or typed characters and convert them to electronic form as text, not images.

10. An input device that reads printed text and graphics and transfers them to a computer in digital form.

11. An input device containing numerous keys, arranged in a configuration similar to that of a typewriter, that can be used to input letters, numbers, and other symbols.

12. A piece of hardware that supplies input to a computer.

13. An output device that sprays droplets of ink to produce images on paper.

14. A device containing tiny chips and radio antennas that is attached to objects that will be identified using RFID technology.

15. The study of identifying individuals based on measurable biological characteristics.

7

Page 8: Tmk 3100(Key Term)

16. Output devices that produce sound.

17. A machine-readable code that represents data as a set of bars.

18. A display device that is touched with the finger to issue commands or otherwise generate input to the connected PC.

19. A system that enables a computer to recognize the human voice.

20. An output device designed for printing digital photographs

CHAPTER 5

KEY TERM MATCHING

Match each key term on the left with the definition on the right that best describes it.

A. backupB. Windows MobileC. Windows EmbeddedD. virtual memoryE. UNIXF. bufferG. device driverH. personal operating systemI. server operating systemJ. utility programK. LinuxL. NetWareM. application softwareN. system softwareO.

1. An operating system developed in the 1970s for midrange servers and mainframes; a variety of variations of this operating system are in use today.

2. The capability of an operating system to use multiple processors in a single computer, usually to process multiple jobs at one time faster than could be performed with a single processor.

3. A type of operating system designed to be installed on a network server.

4. Programs, such as the operating system, that control the operation of a computer and its devices, as well as enable application software to run on the PC.

5. The most recent version of the operating system used on Apple computers.

6. An area in RAM or on the hard drive

8

Page 9: Tmk 3100(Key Term)

multiprocessingP. Windows XPQ. operating systemR. Palm OSS. Mac OS XT. spooling

designated to hold input and output on their way in or out of the system.

7. The operating system designed for Palm handheld PCs.

8. A family of operating systems based on Windows and designed for handheld PCs, smart phones, and other mobile devices.

9. The process of placing items in a buffer so they can be retrieved by the appropriate device (such as a printer) when needed.

10. The latest personal version of Windows; designed to replace both Windows Me and Windows 2000.

11. The main component of system software that enables the computer to manage its activities and the resources under its control, run application programs, and interface with the user.

12. A type of software that performs a specific task, usually related to managing or maintaining the computer system.

13. A widely used operating system for PC-based networks.

14. A duplicate copy of data or other computer contents for use in the event that the original version is destroyed.

15. A type of operating system designed to be installed on a PC.

16. Programs that enable users to perform specific tasks on a computer, such as writing a letter or playing a game.

17. A memory-management technique that uses hard drive space as an extension to a PC's RAM.

9

Page 10: Tmk 3100(Key Term)

18. A version of UNIX that is available without charge over the Internet and is increasingly being used with PCs, servers, mainframes, and supercomputers.

19. A family of operating systems based on Windows and designed for nonpersonal computer devices, such as cash registers and consumer electronic devices.

20. A program that enables an operating system to communicate with a specific hardware device.

CHAPTER 6

KEY TERM MATCHING

Match each key term on the left with the definition on the right that best describes it.

A. databaseB. recordC. software suiteD. workbookE. rowF. software licenseG. formulaH. insertion pointI. spreadsheet softwareJ. word processing softwareK. graphics softwareL. presentation graphics softwareM. fieldN. labelO. commercial software

1. Application software used to create, edit, save, and print written documents.

2. Software that is not copyrighted and may be used without restriction.

3. A collection of worksheets saved in a single spreadsheet file.

4. An agreement, either included in a software package or displayed on the screen during installation, that specifies the conditions under which a buyer of the program can use it.

5. Application software used to create presentation graphics and online slide shows.

6. The location at the intersection of a row and column on a worksheet into which data can be typed.

7. An onscreen character that indicates the current location in a document, which is where the next change will be

10

Page 11: Tmk 3100(Key Term)

P. sharewareQ. tableR. open source softwareS. public domain softwareT. cell

made to the document.

8. Application software used to create spreadsheet documents, which typically contain a great deal of numbers and mathematical computations and are organized into rows and columns.

9. A collection of software programs bundled together and sold as a single software package.

10. A single category of data to be stored in a database, such as a person's name or telephone number. Also called a column.

11. Copyrighted software that is developed, usually by a commercial company, for sale to others.

12. A database record.

13. A collection of related data that is stored in a manner enabling information to be retrieved as needed; in a relational database, a collection of related tables.

14. A collection of related fields in a database. Also called a row.

15. Application software used to create or modify images.

16. Copyrighted software that is distributed on the honor system; should be either paid for or uninstalled after the trial period.

17. In a relational database, a collection of related records (rows).

18. A text-based entry in a worksheet cell that identifies data on the worksheet.

19. An entry in a worksheet cell that performs computations on worksheet data and displays the results.

11

Page 12: Tmk 3100(Key Term)

20. Software programs whose source code is made available to the general public.

CHAPTER 7

KEY TERM MATCHING

Match each key term on the left with the definition on the right that best describes it.

A. computer networkB. twisted-pair cableC. fiber-optic cableD. BluetoothE. hubF. cellular radioG. virtual private network (VPN)H. wireless networkI. Mesh NetworkJ. wide area network (WAN)K. local area network (LAN)L. communications satelliteM. WiMAXN. network interface card (NIC)O. videoconferencingP. global positioning system (GPS)Q. EthernetR. bandwidthS. TCP/IPT.

1. A communications medium that utilizes hundreds of hair-thin, transparent fibers over which lasers transmit data as light.

2. An emerging wireless networking standard that is faster and has a greater range than Wi-Fi.

3. A device that is a central location where data arrives and is then transferred in one or more directions.

4. A widely used communications protocol for a LAN.

5. A group of secure paths over the Internet that provide authorized users a secure means of accessing a private network via the Internet.

6. A form of broadcast radio that broadcasts using antennae located inside honeycomb-shaped cells.

7. A real-time meeting that takes place between people in different locations via computers and communications media.

8. A system that uses satellites and a receiver to determine the exact geographic location of the receiver.

9. The communications protocol that uses packet switching to facilitate the transmission of messages; the protocol used with the Internet.

12

Page 13: Tmk 3100(Key Term)

communications 10. A collection of computers and other hardware devices that are connected together to share hardware, software, and data, as well as to communicate electronically with one another.

11. A network in which there are multiple connections between the devices on the network, so that messages can take any of several possible paths.

12. A communications medium consisting of wire strands twisted in sets of two and bound into a cable.

13. An earth-orbiting device that relays communications signals over long distances.

14. The amount of data that can be transmitted over a communications medium at one time.

15. The transmission of data from one device to another.

16. A network that connects devices located in a large geographical area.

17. A network in which computers and other devices are connected to the network without physical cables.

18. An expansion card through which a computer can connect to a network.

19. A network that connects devices located in a small geographical area, such as within a building.

20. A communications standard for very short-range wireless connections; the devices are automatically connected once they get within the allowable range.

CHAPTER 8

13

Page 14: Tmk 3100(Key Term)

A. Internet service provider (ISP)B. application service provider (ASP)C. distance learningD. direct connectionE. online auctionF. Internet content providerG. cookieH. search engineI. dial-up connectionJ. directory searchK. Web bugL. search siteM. keywordN. online investingO. online shoppingP. World Wide WebQ. InternetR. ARPANETS. video-on-demand (VOD)T. Internet filtering

1. The collection of Web pages available through the Internet.

2. A company that manages and distributes software-based services over the Internet.

3. A software program used by a search site to retrieve matching Web pages from a search database.

4. A Web site designed to help users search for Web pages that match specified keywords or selected categories.

5. Using a software program or browser option to block access to particular Web pages or types of Web pages.

6. A person or an organization that provides Internet content.

7. A type of Internet connection in which the PC or other device must dial up and connect to a service provider's computer via telephone lines before being connected to the Internet.

8. An always-on type of Internet connection in which the PC or other device is continually connected to the Internet.

9. A learning environment in which the student is physically located away from the instructor and other students; commonly instruction and communications take place via the Internet.

10. A business or other organization that provides Internet access to others, typically for a fee.

11. A small file stored on a user's hard drive by a Web server; commonly used to identify personal preferences and

14

Page 15: Tmk 3100(Key Term)

settings for that user.

12. Buying products or services over the Internet.

13. The predecessor of the Internet.

14. Buying and selling stocks or other types of investments over the Internet.

15. A word typed in a search box on a search site to locate information on the Internet.

16. An online activity for which bids are placed on items and the highest bidder purchases the item.

17. A very small (usually invisible) image on a Web page that transmits data about the Web page visitor to a Web server.

18. A type of Internet search in which categories are selected to locate information on the Internet.

19. The process of downloading movies and televisions shows, on demand, via the Internet.

20. The largest and most well-known computer network, linking millions of computers all over the world.

CHAPTER 9

KEY TERM MATCHING

Match each key term on the left with the definition on the right that best describes it.

A. firewallB. dot conC. digital certificateD. Trojan horseE. encryptionF. possessed knowledge

1. Any fraud or scam carried out through the Internet.

2. A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access.

15

Page 16: Tmk 3100(Key Term)

access systemG. biometric access systemH. possessed object access systemI. computer sabotageJ. passwordK. spywareL. computer virusM. denial of service (DoS) attackN. secure Web serverO. war drivingP. spoofingQ. phishingR. hackingS. identity theftT. online auction fraud

3. A software program installed without the user's knowledge that secretly collects information and sends it to an outside party via the user's Internet connection.

4. An access control system that uses physical objects that an individual has in his or her possession to identify that individual.

5. An act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function.

6. Any act of malicious destruction to a computer or computer resource.

7. Using a computer to break into another computer system.

8. A method of scrambling e-mail or files to make them unreadable if they are intercepted by an unauthorized user.

9. Driving around an area with a Wi-Fi-enabled computer or mobile device to find a Wi-Fi network to access and use without authorization.

10. When an item purchased through an online auction is never delivered after payment, or the items is not as specified by the seller.

11. A Web server that uses encryption to protect information transmitted via the Web pages stored on that server.

12. An access control system that uses information that only an individual should know to identify that individual.

13. The use of spoofed e-mail messages to gain credit card numbers and other personal data to be used for

16

Page 17: Tmk 3100(Key Term)

fraudulent purposes.

14. Making it appear that an e-mail or a Web site originates from somewhere other than where it really does; typically used with dot cons.

15. A software program installed without the user's knowledge and designed to alter the way a computer operates or to cause harm to the computer system.

16. A group of electronic data, such as encryption key pairs and a digital signature, that can be used to verify the identity of a person or organization.

17. A secret combination of characters used to gain access to a computer, computer network, or other resource.

18. A malicious program that masquerades as something else.

19. Using someone else's identity to purchase goods or services, obtain new credit cards or bank loans, or otherwise illegally masquerade as that individual.

20. An access control system that uses one unique physical characteristic of an individual (such as a fingerprint, face, or voice) to authenticate that individual.

CHAPTER 10

KEY TERM MATCHING

Match each key term on the left with the definition on the right that best describes it.

A. videoB. Dynamic HTML (DHTML)

1. A markup language widely used for creating Web pages.

17

Page 18: Tmk 3100(Key Term)

C. GIFD. JPEGE. XHTML (Extensible Markup Language)F. Wireless Markup LanguageG. markup languageH. HTML (Hypertext Markup Language)I. PNGJ. JavaScriptK. XMLL. page layoutM. flowchartN. Web site authoring softwareO. textP. storyboardQ. graphicR. audioS. multimediaT. animation

2. A sketch of a Web page often developed during the Web design process to illustrate the basic layouts of the home page and the rest of the pages on a Web site.

3. A graphics format that supports 256 colors and is commonly used for Web page line art images.

4. A digital representation of a photograph, drawing, chart, or other visual image.

5. A tool that can be used during the Web design process to illustrate how the pages in a Web site relate to one another.

6. The integration of a variety of media, such as text, graphics, video, animation, and sound.

7. The process by which a series of graphical images are displayed one after the other to simulate movement.

8. A language similar to XML that is used with pages to be displayed on WAP-enabled devices.

9. A newer, stricter version of HTML that is based on XML.

10. A continuous stream of visual information broken into separate images or frames to be displayed one after the other to simulate the original visual event.

11. A type of application program used to create Web pages and complete Web sites.

12. A form of HTML used to add dynamic capabilities and interactivity to Web pages.

13. A graphics format that supports true color and is commonly used for

18

Page 19: Tmk 3100(Key Term)

photographs inserted in Web pages.

14. A set of rules used for exchanging data over the Web; addresses only the content, not the formatting, so the device being used displays the content in an appropriate format.

15. Alphanumeric characters kept in a nongraphic, format.

16. An ordered series of sketches that can be developed during the design process of an animated sequence or other multimedia component of a Web site that illustrates what each page or screen in the application will look like.

17. Sound, such as music, spoken voice, and sound effects.

18. A language that uses symbols or tags to describe what a document should look like when it is displayed in a Web browser.

19. A scripting language widely used to add dynamic content to Web pages.

20. A newer graphics format designed for use with Web page images

CHAPTER 11

KEY TERM MATCHING

Match each key term on the left with the definition on the right that best describes it.

A. electronic checkB. data warehouseC. brick-and-mortar storeD. smart cardE. business modelF. e-commerce business model

1. An Internet-only store with no physical presence.

2. A Web site where potential buyers bid on an item and, at the end of a set time period, the highest bidder buys the item as long as all bidding criteria, such as minimum selling price, have been met.

3. An online retailer.

19

Page 20: Tmk 3100(Key Term)

G. online payment accountH. brokerage siteI. online auction siteJ. intermediary hub modelK. business-to-government (B2G) modelL. business-to-business (B2B) model M. business-to-consumer (B2C) modelN. consumer-to-consumer (C2C) modelO. digital walletP. dot-comQ. e-tailerR. storefront softwareS. data miningT. e-commerce

4. An encrypted electronic file that holds information that can speed up online purchase transactions, such as electronic payment, billing, and shipping information.

5. A comprehensive collection of data about a company and its customers.

6. An e-commerce model in which a business provides goods and services to government organizations.

7. A type of Web site used to bring buyers and sellers together to facilitate transactions, such as online stock trading and exchanging goods, services, and commodities.

8. An e-commerce model in which a consumer provides goods or services to other consumers.

9. A type of payment account accessed via the Internet and used to make electronic payments to others, either from funds deposited into the account or by charging the appropriate amount to a credit card.

10. A conventional store with a physical presence.

11. The process of using intelligent software to analyze data warehouses for patterns and relationships.

12. E-commerce software that allows the creation of an online store.

13. A description of the types of buyers and sellers involved in an e-commerce company, such as B2B, B2G, and so forth.

14. A check written and submitted electronically via the Internet.

15. An e-commerce model in which a business provides goods or services to

20

Page 21: Tmk 3100(Key Term)

consumers.

16. The act of doing business transactions over the Internet or similar technology.

17. An e-commerce model in which a business brings buyers and sellers together, instead of directly selling goods or services.

18. A credit-card-sized piece of plastic containing a chip and other circuitry into which data can be stored.

19. An e-commerce model in which a business provides goods or services to other businesses.

20. A description of how a company does business, such as its policies, operations, and technology.

CHAPTER 12

KEY TERM MATCHING

Match each key term on the left with the definition on the right that best describes it.

A. systemB. expert systemC. robotD. computer-aided design (CAD)E. computer-aided manufacturing (CAM)F. neural networkG. geographic information system (GIS)H. systems analystI. prototypingJ. artificial

1. The process consisting of the six phases of system development: preliminary investigation, system analysis, system design, system acquisition, system implementation, and system maintenance.

2. Exchanging information from an ERP or other internal system among different applications and organizations.

3. A type of information system that provides decision makers with preselected information that can be used to make middle-management decisions.

4. A collection of elements and procedures that interact to accomplish a goal.

21

Page 22: Tmk 3100(Key Term)

intelligence (AI)K. inter-enterprise systemL. benchmark testM. transaction processing systemN. management information system (MIS)O. order entry systemP. enterprise application integration (EAI)Q. supply chain management (SCM)R. system development life cycle (SDLC)S. customer relationship management (CRM)T. outsourcing

5. A type of transaction system that records and manages order processing.

6. A system in which a computer performs actions that are characteristic of human intelligence.

7. A type of information system that processes and records data created by an organization's business transactions.

8. A general term applied to the use of computer technology to automate manufacturing functions.

9. Turning over specific business tasks to an outside vendor; increasingly, the vendor is located in a different country with lower labor costs.

10. An expert system in which the human brain's pattern-recognition process is emulated by the computer system.

11. An information system that combines geographic information with other types of data (such as information about your customers, sales, and so forth) in order to provide a better understanding of the relationships among the data.

12. A person who studies systems in an organization in order to determine what work needs to be done and how this work may best be achieved.

13. The process of building and managing good relationships with customers.

14. A computer system that provides the type of advice that would be expected from a human expert.

15. A system that links multiple enterprises, such as a business and its customers, suppliers, and partners.

22

Page 23: Tmk 3100(Key Term)

16. A general term applied to the use of computer technology to automate design functions.

17. A device, controlled by a human operator or a computer, that can move and react to sensory input.

18. A system development alternative whereby a small model, or prototype, of the system is built before the full-scale systems development effort is undertaken.

19. A test used to measure computer system performance under typical use of conditions prior to purchase.

20. The oversight of materials, information, and finances as they move from the original supplier to the consumer.

CHAPTER 13

KEY TERM MATCHING

Match each key term on the left with the definition on the right that best describes it.

A. source codeB. COBOLC. FORTRAND. CE. JavaF. compilerG. interpreterH. programmerI. logic errorJ. syntax errorK. PascalL. flowchartM. object-oriented programming (OOP)N. structured programmingO. BASICP. Visual Basic

1. A structured, high-level programming language that is often used to teach structured programming; especially appropriate for use in math and science applications.

2. An object-oriented, fourth-generation version of the BASIC programming language.

3. A high-level structured programming language that has the executional efficiency of an assembly language.

4. A high-level programming language used for mathematical, scientific, and engineering applications.

5. The process of ensuring a program is free of errors.

23

Page 24: Tmk 3100(Key Term)

Q. object codeR. program development life cycle (PDLC)S. debuggingT. coding

6. A language translator that converts program statements line-by-line into machine language, immediately executing each one.

7. A program design tool that shows graphically step-by-step how a computer program will process data.

8. A language translator that converts an entire program into machine language before executing it.

9. A computer program before it is compiled.

10. An easy-to-learn, high-level programming language that was developed to be used by beginning programmers.

11. A person whose job it is to write, test, and maintain computer programs.

12. An approach to program design in which a program consists of a collection of objects that contain data and methods to be used with that data.

13. An approach to program design in which a program is separated into smaller subprograms, and step-by-step instructions are executed one after the other, accessing the subprograms when needed.

14. The process of writing the programming language statements to create a computer program.

15. A programming error that occurs when the programmer has not followed the rules of the programming language.

16. A programming error that occurs when running a program produces incorrect results.

17. The process containing the five steps of program development:

24

Page 25: Tmk 3100(Key Term)

analyzing, designing, coding, debugging and testing, and maintaining application software.

18. The machine-language version of a computer program generated after the program's source code is compiled.

19. A high-level, object-oriented programming language frequently used for Web-based applications.

20. A high-level programming language developed for transaction processing applications.

CHAPTER 14

KEY TERM MATCHING

Match each key term on the left with the definition on the right that best describes it.

A. databaseB. recordC. reportD. direct organizationE. structured query language (SQL)F. queryG. fieldH. indexI. primary keyJ. multidimensional database (MDDB)K. relational database management system (RDBMS)L. object-oriented database management system

1. Software used to connect two otherwise separate applications, such as a Web server and a database management system.

2. A type of database system in which data is stored in tables related by common fields; the most widely used database model today.

3. The process of describing the characteristics of data that is to be included in a database table.

4. A specific field in a database table that uniquely identifies the records in that table.

5. A single category of data to be stored in a database, such as a person's name or telephone number. Also called a column.

6. The repository of all data definitions in a database.

7. A popular query language standard

25

Page 26: Tmk 3100(Key Term)

(OODBMS)M. database management system (DBMS)N. tableO. data securityP. middlewareQ. entityR. data definitionS. data validationT. data dictionary

for information retrieval in relational databases.

8. A formatted means of looking at a database table or the results of a query.

9. A type of database in which data can be viewed from multiple dimensions; commonly used with data warehousing.

10. A small table containing a primary key and the location of the record belonging to that key; used to locate records in a database.

11. A collection of related fields in a database. Also called a row.

12. A method of arranging data on a storage medium that uses hashing to specify the exact storage location.

13. A collection of related data that is stored in a manner enabling information to be retrieved as needed; in a relational database, a collection of related tables.

14. The process of ensuring that data entered into a database matches the data definition.

15. A type of software program used to create, maintain, and access databases.

16. Something in a database system (such as a person, object, or event) that is of importance to the organization.

17. A request to see information from a database matching specified criteria.

18. A type of database system in which multiple types of data are stored as objects along with their related code.

19. Protecting data in a database against destruction and misuse.

20. In a relational database, a collection of related records (rows).

26

Page 27: Tmk 3100(Key Term)

CHAPTER 15

KEY TERM MATCHING

Match each key term on the left with the definition on the right that best describes it.

A. marketing databaseB. uninterruptible power supply (UPS)C. surge suppressorD. throw-away e-mail addressE. privacy policyF. e-mail filterG. disaster-recovery planH. proximity cardI. employee monitoringJ. computer monitoring softwareK. presence technologyL. system failureM. video surveillanceN. information privacyO. hardware theftP. software piracyQ. digital counterfeitingR. opt outS. spamT. electronic profiling

1. A device that protects a computer system from damage due to electrical fluctuations.

2. A device containing a built-in battery that provides continuous power to a PC and other connected components when the electricity goes out.

3. To request that you be removed from marketing activities or that your information not be shared with other companies.

4. Software that can be used to record an individual's computer usage, typically either by capturing images of the screen or by recording the actual keystrokes used.

5. The complete malfunction of a computer system.

6. Observing or reviewing employees' actions while they are on the job.

7. The use of computers or other types of digital equipment to make illegal copies of currency, checks, collectibles, and other items.

8. A policy, commonly posted on a company's Web site, that explains how personal information provided to that company will be used.

9. An e-mail address used only for nonessential purposes and activities that may result in spam; the address can be disposed and replaced if spam becomes a problem.

27

Page 28: Tmk 3100(Key Term)

10. Unsolicited, bulk e-mail sent over the Internet.

11. The use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.

12. The theft of computer hardware.

13. Technology that enables one computing device (such as a desktop PC, handheld computer, or smart phone) to locate and identify the current status of another device on the same network.

14. Using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits.

15. The rights of individuals and companies to control how information about them is collected and used.

16. An identification card with built-in smart card capabilities; used for access purposes, as well as for location monitoring.

17. A tool that automatically sorts your incoming e-mail messages based on specific criteria.

18. A collection of data about people that is stored in a large database and used for marketing purposes.

19. A written plan that describes the steps a company will take following the occurrence of a disaster.

20. The unauthorized copying of a computer program

28

Page 29: Tmk 3100(Key Term)

CHAPTER 16

KEY TERM MATCHING

Match each key term on the left with the definition on the right that best describes it.

A. eco-labelB. docking stationC. patentD. carpel tunnel syndrome (CTS)E. code of conductF. burnoutG. digital watermarkH. repetitive stress injury (RSI)I. trademarkJ. computer hoaxK. assistive technologyL. ethicsM. plagiarismN. digital manipulationO. digital divideP. intellectual property rightsQ. computer/Internet addictionR. copyrightS. ergonomicsT. green computing

1. Hardware and software specifically designed for use by individuals with physical disabilities.

2. A state of fatigue or frustration usually brought on by overwork.

3. A type of injury, such as carpal tunnel syndrome, that is caused by performing the same physical movements over and over again.

4. The science of fitting a work environment to the people who work there.

5. The legal right to sell, publish, or distribute an original artistic or literary work; is held by the creator of a work as soon as it exists in physical form.

6. A subtle alteration of digital content that is not noticeable under normal use, but that identifies the copyright holder.

7. A painful and crippling condition affecting the hands and wrist that can be caused by computer use.

8. A device that connects a portable PC to conventional hardware, such as a keyboard, mouse, monitor, and printer.

9. The problem of overusing, or being unable to stop using, a computer or the Internet.

10. The use of computers in an environmentally friendly manner.

11. A policy, often for a school or business, that specifies allowable use of resources such as computers and other equipment.

29

Page 30: Tmk 3100(Key Term)

12. Overall standards of moral conduct.

13. The alteration of digital content, usually text or photographs.

14. A form of protection that can be granted by the government for an invention; gives exclusive rights of an invention to its inventor for 20 years

15. An inaccurate statement or story spread through the use of computers.

16. A word, phrase, symbol, or design that identifies a good or service.

17. A certification, often by a government agency, that identifies a device as meeting minimal environmental performance specifications.

18. The rights to which creators of original creative works (such as artistic or literary works, inventions, corporate logos, and more) are entitled.

19. The gap between those who have access to technology and those who don't.

20. Presenting someone else's work as your own

30