CPT 101 Final
Spring '08 semester, CPT 101
Terms
undefined, object
copy deck
- EULA users are permitted to:
- Install software on 1 computer, make 1 copy as back up, give or sell the software to one other individual only after the software is removed from users computer first
- Ergonomics
- an applied science devoted to incorporating comfort, efficiency, and safety into the design if items in the workplace
- Entry level jobs for students with a 2 yr. CIS degree include:
- application programer/developer, computer operator, computer sales rep, computer tech, graphic designer, help desk specialist, and technical writer
- Slide Pane
- which shows a large view of the current slide on the right side of the window
- Machine language
- known as the first generation of programming languages, is the only language the computer directly recognizes
- Full Backup
- provides the best protection against data loss b/c it copies all program and data files
- Symptoms of a user w/ computer addiction include the following:
- Cravings, Overjoyed when at computer, unable to stop activity, irritable when not at computer, neglects family and friends, problems at work and school
- Spoofing
- a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
- Computer Information System (CIS)
- after 2 yr. study in a CS curriculum students may receive an assoc. degree or certificate
- Notes Pane
- at the bottom of the window, is an area where you can type notes and addt'l info
- Zombie
- compromised computer, one whose owner is unaware the computer is being controlled remotely by an outsider
- Encryption
- a process of converting readable data into unreadable characters to prevent unauthorized access
- Hard copy or Printout
- printed version of the worksheet
- A power point presentation is called a
- slide show
- Worm
- a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network
- Emergency Plan
- specifies steps t be taken immediately after a disaster strikes
- Print Layout View
- also the default (preset) view, shows the document on a mock sheet of paper in the document window
- The MLA styles uses
- in-text Parenthetical Citations
- Information Technology Association of America (ITAA)
- estimates tat the current IT workforce is more than 10.5 million w/ an expected increase of 2- 3 % per year
- Phishing
- a scam in which a perpetrator sends an official e-mail message that attempts to obtain your personal and financial information
- Single-user license agreement; end-user license agreement (EULA)
- most commonly type of license included w/ software purchased by individual users
- Best Fit
- means that the width of the column will be increased or decreased so the widest entry will fit in the column
- Office Button
- a central location for managing and sharing documents
- Pharming
- a scam where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing
- Drag and Drop
- Using the mouse to move or copy cells
- Cookie
- a small text file that a Web server stores n your computer
- Computer Security Risk
- any event or action that could cause loss of or damage to hardware, software, data, information, or processing capabilities
- Pixel
- a dot on the screen that contains a color
- Trojan Horse
- program that hides w/in or looks like a legitimate program. A certain action or condition usually triggers the viral program.
- Brownout
- a prolonged under-voltage
- Websites use cookies to
- track users preferences, store users' passwords, keep track of items, track how regularly users visit a site, target advertisments
- Honeypot
- a vulnerable computer that is set up to entice an intruder to break into it
- The default view for PPT is
- Normal
- Examples of Biometric
- finger print scanners, hand geometry systems, signature verification systems, iris recognition systems, and retinal scanners
- A Disaster Recovery Plan contains 4 major components:
- The emergency plan, the backup plan, the recovery plan, and the test plan
- Information Systems (IS)
- a collection of hardware, software, data, people, and procedure that work together to produce quality information
- Spyware
- a program placed on a computer w/out the users knowledge that secretly collects information about the user
- System analyst
- responsible for designing and developing an information system; they are also the users primary contact
- Enterprise refers to
- large multinational corporations, universities, hospitals, research laboratories, and government organizations,
- Finger print scanners
- most commonly used biometric
- Disaster Recovery Plan
- written plan describing steps a company would take to restore computer operations in the event of a disaster
- Backup Plan
- specifies how a company uses backup files and equipment to resume information processing
- Noise
- any unwanted signal that is mixed w/ the normal voltage entering the computer
- Enterprise Resources Planning (ERP)
- provides centralized, integrated software to help manage and coordinate the ongoing activities of the enterprise, including manufacturing and distribution, accounting, finance, sales, product planning, and human resources
- Test Plan
- contains info for simulating various levels of disaster and recording an organizational ability to recover
- Incremental Backup
- copies only the files that have changed since the last full backup or last incremental backup
- Menu
- contains a list of commands
- Computer Forensics/digital/network/cyber forensics
- the discovery, collection, and analysis of evidence found on computer networks
- Computer Aided Design (CAD)
- uses a computer and special software to aid in engineering, drafting, and design
- Gantt Chart
- an effective way to show the time relationships of a projects activities
- Advantages of ERP include:
- complete integration of information systems across departments, better project management, and better customer service
- Certification
- the process of verifying the technical knowledge of an individual who has demonstrated competence in a particular area
- Uninterruptible Power Supply (UPS)
- device that contains surge protections circuits and one or more batteries that can provide power during a temporary or permanent loss of power
- Computer Aided Manufacturing (CAM)
- the use of computers to control production equipment
- Recovery Plan
- specifies the actions to be taken to restore full info processing operations
- Under-voltage
- when electrical supply drops
- Benefits of Certification:
- Career, Professional, Salary
- over-voltage or power surge
- occurs when the incoming electrical power increases significantly above the normal 120 volts
- View
- the mode in which the presentation appears on the screen
- Possessed Object
- any item that you must carry to gain access to a computer or computer facility
- Differential Backup
- copies only the files that have changed since last full backup
- Document Window
- portion of a document through which you view on the screen
- Most system development cycles contain five phases:
- Planning, analysis, design, implementation, operation/support/security
- Submenu
- a list of additional commands associated with the selected command
- Copyright
- gives authors and artists exclusive rights to duplicate, publish, and sell their materials
- Insertion Point
- blinking vertical bar that indicates where text, graphics, and other items will be inserted
- Virus
- a potentially damaging comp program that affects, or infects, computers negatively by altering the way the computer works w/out the users knowledge or permission
- Selective Backup
- sometimes called a partial backup, allows the user to choose specific files to backup