This site is 100% ad supported. Please add an exception to adblock for this site.

CPT 101 Final

Spring '08 semester, CPT 101

Terms

undefined, object
copy deck
EULA users are permitted to:
Install software on 1 computer, make 1 copy as back up, give or sell the software to one other individual only after the software is removed from users computer first
Ergonomics
an applied science devoted to incorporating comfort, efficiency, and safety into the design if items in the workplace
Entry level jobs for students with a 2 yr. CIS degree include:
application programer/developer, computer operator, computer sales rep, computer tech, graphic designer, help desk specialist, and technical writer
Slide Pane
which shows a large view of the current slide on the right side of the window
Machine language
known as the first generation of programming languages, is the only language the computer directly recognizes
Full Backup
provides the best protection against data loss b/c it copies all program and data files
Symptoms of a user w/ computer addiction include the following:
Cravings, Overjoyed when at computer, unable to stop activity, irritable when not at computer, neglects family and friends, problems at work and school
Spoofing
a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
Computer Information System (CIS)
after 2 yr. study in a CS curriculum students may receive an assoc. degree or certificate
Notes Pane
at the bottom of the window, is an area where you can type notes and addt'l info
Zombie
compromised computer, one whose owner is unaware the computer is being controlled remotely by an outsider
Encryption
a process of converting readable data into unreadable characters to prevent unauthorized access
Hard copy or Printout
printed version of the worksheet
A power point presentation is called a
slide show
Worm
a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network
Emergency Plan
specifies steps t be taken immediately after a disaster strikes
Print Layout View
also the default (preset) view, shows the document on a mock sheet of paper in the document window
The MLA styles uses
in-text Parenthetical Citations
Information Technology Association of America (ITAA)
estimates tat the current IT workforce is more than 10.5 million w/ an expected increase of 2- 3 % per year
Phishing
a scam in which a perpetrator sends an official e-mail message that attempts to obtain your personal and financial information
Single-user license agreement; end-user license agreement (EULA)
most commonly type of license included w/ software purchased by individual users
Best Fit
means that the width of the column will be increased or decreased so the widest entry will fit in the column
Office Button
a central location for managing and sharing documents
Pharming
a scam where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing
Drag and Drop
Using the mouse to move or copy cells
Cookie
a small text file that a Web server stores n your computer
Computer Security Risk
any event or action that could cause loss of or damage to hardware, software, data, information, or processing capabilities
Pixel
a dot on the screen that contains a color
Trojan Horse
program that hides w/in or looks like a legitimate program. A certain action or condition usually triggers the viral program.
Brownout
a prolonged under-voltage
Websites use cookies to
track users preferences, store users' passwords, keep track of items, track how regularly users visit a site, target advertisments
Honeypot
a vulnerable computer that is set up to entice an intruder to break into it
The default view for PPT is
Normal
Examples of Biometric
finger print scanners, hand geometry systems, signature verification systems, iris recognition systems, and retinal scanners
A Disaster Recovery Plan contains 4 major components:
The emergency plan, the backup plan, the recovery plan, and the test plan
Information Systems (IS)
a collection of hardware, software, data, people, and procedure that work together to produce quality information
Spyware
a program placed on a computer w/out the users knowledge that secretly collects information about the user
System analyst
responsible for designing and developing an information system; they are also the users primary contact
Enterprise refers to
large multinational corporations, universities, hospitals, research laboratories, and government organizations,
Finger print scanners
most commonly used biometric
Disaster Recovery Plan
written plan describing steps a company would take to restore computer operations in the event of a disaster
Backup Plan
specifies how a company uses backup files and equipment to resume information processing
Noise
any unwanted signal that is mixed w/ the normal voltage entering the computer
Enterprise Resources Planning (ERP)
provides centralized, integrated software to help manage and coordinate the ongoing activities of the enterprise, including manufacturing and distribution, accounting, finance, sales, product planning, and human resources
Test Plan
contains info for simulating various levels of disaster and recording an organizational ability to recover
Incremental Backup
copies only the files that have changed since the last full backup or last incremental backup
Menu
contains a list of commands
Computer Forensics/digital/network/cyber forensics
the discovery, collection, and analysis of evidence found on computer networks
Computer Aided Design (CAD)
uses a computer and special software to aid in engineering, drafting, and design
Gantt Chart
an effective way to show the time relationships of a projects activities
Advantages of ERP include:
complete integration of information systems across departments, better project management, and better customer service
Certification
the process of verifying the technical knowledge of an individual who has demonstrated competence in a particular area
Uninterruptible Power Supply (UPS)
device that contains surge protections circuits and one or more batteries that can provide power during a temporary or permanent loss of power
Computer Aided Manufacturing (CAM)
the use of computers to control production equipment
Recovery Plan
specifies the actions to be taken to restore full info processing operations
Under-voltage
when electrical supply drops
Benefits of Certification:
Career, Professional, Salary
over-voltage or power surge
occurs when the incoming electrical power increases significantly above the normal 120 volts
View
the mode in which the presentation appears on the screen
Possessed Object
any item that you must carry to gain access to a computer or computer facility
Differential Backup
copies only the files that have changed since last full backup
Document Window
portion of a document through which you view on the screen
Most system development cycles contain five phases:
Planning, analysis, design, implementation, operation/support/security
Submenu
a list of additional commands associated with the selected command
Copyright
gives authors and artists exclusive rights to duplicate, publish, and sell their materials
Insertion Point
blinking vertical bar that indicates where text, graphics, and other items will be inserted
Virus
a potentially damaging comp program that affects, or infects, computers negatively by altering the way the computer works w/out the users knowledge or permission
Selective Backup
sometimes called a partial backup, allows the user to choose specific files to backup

Deck Info

68

permalink