Unformatted text preview:

NAS devices are servers connected to a network with the sole purpose of providing storage Tape no longer is used as a primary method of storage but is used most often for long term storage and backup The smallest unit of data a computer can process is a n bit Formatting is the process of dividing a disk into tracks and sectors so the operating system can store and locate data and information on the disk Multisession means you can write on one part of a disc at one time and another part at a later time A DVD ROM is a type of optical disc that users can read from but not write or erase Users subscribe to a cloud storage service like the kind advertised in the accompanying figure to all of the above All of the following are competing rewritable DVD formats EXCEPT DVD R Common types of flash memory cards include all of the above A CD RW overcomes the major disadvantage of CD R disks which is being able to write on them only once ExpressCard modules can be used to add all of the following EXCEPT printing capabilities to a computer Capacity is the number of bytes characters a storage medium can hold Plug and Play means the operating system automatically configures new devices as users install them A pop up blocker is a filtering program that stops pop up ads from displaying on Web pages A fault tolerant computer is a computer that continues to operate when one of its components fails ensuring that no data is lost The BIOS is firmware that contains a computer s startup instructions A single user single tasking operating system allows only one user to run one program at a time Smart phones and others small computing devices often use a single use single tasking operating system Two type of system software are operating systems and utility programs System software such as operating systems and utility programs consists of the programs that control or maintain the operations of a computer and its devices Booting is the process of starting or restarting a computer In Windows the Startup Folder contains a list of programs that open automatically when users boot the computer The area of the hard disk used for virtual memory is called a swap file because it exchanges data information and instructions between memory and storage Ethernet is a network standard that specifies no central computer or device on the network should control when data can be transmitted For smaller business and home networks a router allows multiple computers to share a single high speed Internet connection such as through a cable modem or DSL modem Microwave transmission often called fixed wireless involves sending signals from one microwave station to another A wireless access point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network Developed by IEEE 802 11 is a series of network standards that specifies how two wireless devices communicate over the air with each other DSL uses a modem that sends digital data and information from a computer to a DSL line A hot spot is a wireless network that provides Internet connections to mobile computers and other devices An online meeting allows users to share documents with others in real time A communications channel is a transmission media on which data instructions or information travel VoIP Voice over IP is a conversation that takes place over the Internet using a telephone connected to a computer mobile device or telephone adapter A network is a collection of computers and devices connected together via communications devices and transmission media A Peer to Peer network is a simple inexpensive network that typically connects fewer than 10 computers In managing a company s database the database administrator requires a technical inside view of data A data file is a collection of related records stored on storage media such as a hard disk or optical disk A major weakness of a lot of file processing systems is that they have redundant data and they isolate data A hypercube allows users to access and analyze any view of the database data In a relational database each row has a primary key and each column has a unique name Occasionally a database can be damaged or destroyed because of all of the above A backup or copy of the entire database should be made on a regular basis Because a data dictionary contains details about the date in a database some call it metadata A OODB stores data in objects The developer of a relational database refers to a record as a tuple A database is a collection of data organized in a manner tha allows access retrieval and use of that data Object oriented and object relational databases often use a query language called OQL to manipulate and retrieve data One approach to content filtering is through a rating system of ICRA which is similar to those used for movies and videos Spyware is a program placed on a computer without the user s knowledge A PIN is a numeric password either assigned by a company or selected by a user A full backup copies all of the files in a computer Software theft occurs when someone steals software media intentionally erases software programs or illegally copies a software program Secure HTTP which allows users to choose an encryption scheme that passes between a client and a server requires that botht the client and server have digital certificates A certificate authority is an authorized person or company that issues and verifies digital certificates A computer security risk is any even or action that could cause a loss of or damage to computer hardware software data information or processing capability A UPS connects between a computer and a power source A cookie is a small text file that a web server stores on a user s computer C is an object oriented language based on C and has been accepted as a standard for web applications and XML based web services A computer program is a series of instructions that directs a computer to perform tasks A scripting language is an interpreted language that typically is easy to learn and use In sequence the program development life cycle consists of six steps analyze requirements design solution validate design implement design test solution and document solution Cobol which is a programming language designed for business applications evolved out of a joint effort between the US government businesses and major universities HTML is a special formatting language that


View Full Document

FSU CGS 2060 - Notes

Documents in this Course
Notes

Notes

11 pages

CGS Quiz

CGS Quiz

12 pages

QUIZ 8

QUIZ 8

3 pages

Chapter 1

Chapter 1

22 pages

EXAM 2

EXAM 2

9 pages

CHAPTER 7

CHAPTER 7

25 pages

QUIZ 1

QUIZ 1

3 pages

Chapter 7

Chapter 7

25 pages

Quizlet

Quizlet

2 pages

Notes

Notes

4 pages

Quiz #7

Quiz #7

24 pages

Notes

Notes

22 pages

QUIZ 10

QUIZ 10

3 pages

Chapter 1

Chapter 1

21 pages

CHAPTER 7

CHAPTER 7

25 pages

CHAPTER 7

CHAPTER 7

31 pages

Chapter 1

Chapter 1

22 pages

Exam 2

Exam 2

6 pages

Notes

Notes

25 pages

QUIZ 4

QUIZ 4

2 pages

QUIZ 3

QUIZ 3

2 pages

Exam 1

Exam 1

47 pages

QUIZ 11

QUIZ 11

3 pages

QUIZ 4

QUIZ 4

2 pages

QUIZ 7

QUIZ 7

3 pages

Quiz 7

Quiz 7

5 pages

Chapter 7

Chapter 7

20 pages

QUIZ 1

QUIZ 1

5 pages

QUIZ 9

QUIZ 9

2 pages

Chapter 7

Chapter 7

36 pages

Chapter 7

Chapter 7

29 pages

Chapter 1

Chapter 1

22 pages

QUIZ 2

QUIZ 2

3 pages

Quiz #1

Quiz #1

15 pages

Chapter 7

Chapter 7

21 pages

Test 1

Test 1

14 pages

Chapter 6

Chapter 6

19 pages

Quiz 1

Quiz 1

18 pages

Exam 2

Exam 2

19 pages

Test 2

Test 2

18 pages

Exam 2

Exam 2

8 pages

CHAPTER 5

CHAPTER 5

12 pages

MIDTERM

MIDTERM

35 pages

Exam 1

Exam 1

7 pages

Exam 2

Exam 2

22 pages

Exam 1

Exam 1

12 pages

Exam 1

Exam 1

7 pages

Exam 1

Exam 1

7 pages

Exam 2

Exam 2

19 pages

EXAM 1

EXAM 1

5 pages

Exam 2

Exam 2

3 pages

Exam 2

Exam 2

22 pages

Exam 2

Exam 2

6 pages

Exam 1

Exam 1

7 pages

Exam 2

Exam 2

19 pages

CHAPTER 5

CHAPTER 5

12 pages

Chapter 1

Chapter 1

40 pages

Exam 1

Exam 1

11 pages

Notes

Notes

30 pages

Load more
Download Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?