Information Systems is an introductory computer systems and applications course that includes hardware, peripherals, operating systems, applications, networking, Internet, security, information systems, system development, programming, databases, and social issues.
This course comprises 13 lessons on information systems and computer applications. Each lesson includes a combination of Wikipedia readings, YouTube videos, and hands-on learning activities. The course also assists learners in preparing for the CLEPInformation Systems exam.
This entire Wikiversity course can be downloaded in book form by selecting Download Learning Guide in the sidebar. The corresponding Wikibook can be downloaded in book form by selecting Download Wikibook.
Review Wikipedia: Moore's law. In 2005, Gordon Moore stated that this projection cannot be sustained indefinitely. Research current projections for the technical limits of Moore's law and any potential alternatives to sustain this growth in processing performance.
Review After Moore's Law- The Future of Computing [7] to learn about future of computing- possible end of Moore’s law which will be disguised by the shift to cloud computing.
Search the Internet for the top business computer vendors by market share. For one of the top three vendors, compare prices and capabilities for their tablets, laptops, desktops, workstations, servers, and thin clients. Consider how each of these devices might be a cost-effective solution in your school or business.
Review Wikipedia: Internet of Things. Consider your own home, school, or work environment. Which devices in this environment would be more useful if they were connected to the network? Are there any associated security risks in connecting these devices? Would there be any privacy concerns if others were able to monitor your use of these devices?
Review CLEP: Information Systems to learn about this exam and consider whether completing this exam would be beneficial for you. Practice using the sample questions and find out about the study resources available for this exam, including this Wikiversity learning project
Review http://www.blurb.com/blog/how-to-choose-the-right-ebook/ to learn how to choose the right eBook or Tablet for you. In today's technologically savvy world, choosing the right handheld device that will fit your every day needs is not only essential, but required for work and educational purposes. Before spending what seems like a good chunk of change for an ebook or tablet, make sure you've chosen the right one for you.
Identify computers and information systems in your work and personal environments. How many different computer systems do you interact with on a daily basis?
Research and compare different information systems. How do information systems and sources influence our personal and work environments? Is there an information system that could benefit you to increase your productivity?
How are information technologies changing the way we interact with others in the workplace and in our personal lives? Describe the advantages and disadvantages.
Describe digital tools that make you more productive at work or home. Identify digital tools that make you less productive.
Computers and mobile devices have become an almost every-day use for individuals of every age. Having one at home or in the business environment will allow you to access the Internet, and be more knowledgeable, more efficient, and more productive.[source?]
Portable computers are compact and fully functioning versions of a regular desktop computer that are designed to be mobile. They allow freedom to move around while still being productive. Their mobility alongside their ability to operate similar to a desktop make them powerful tools for businessmen, students, and common individuals alike.[1]
Mainframe computers are much larger computers that consolidate the needs of large organizations like universities, hospitals, banks, government offices, etc.[2]
Data is essentially the raw (unorganized) facts that are usually typed into a computer.[3]
Information is the output. The computer processes the data and spits out the information.[4]
The term hardware refers to the components used to build a computer. Breaking down the components into categories, you will find five main groups: input, output, memory, CPU, and communications hardware.[5]
Communications hardware is important when it comes to letting computer users access information from the Internet, put information onto the Internet, or interact with other computer users on a network.[6]
Most personal computers are made up of a central processing unit, control circuitry on an integrated circuit, and various input/output devices.[7]
A URL uniquely identifies a specific Web page. The URL is composed of a communication protocol, (typically HTTP or HTTPS,) a domain name, and a page.[8]
Domain names are like fingerprints; two of the same cannot exist.[9]
Certain webpages have specific programs and algorithms that sort through the vast expanse of information available on the web. These websites work by processing keywords that are typed into the search bar and display a large list of webpages matching the keywords.[10]
Netiquette describes the do's and don'ts of online communicating. Basic courtesy and common sense are generally the rule of the day when communicating, whether it is face-to-face or through the Internet.[11]
Integrity is the quality of being honest and having strong moral principles; moral uprightness. It is generally a personal choice to uphold oneself to consistent moral and ethical standards.[12]
Advantages of computer use include improved efficiency, quality, communication, and collective knowledge.[13]
Disadvantages of computer use include excessive use, security and privacy concerns.[14]
Examples of an application include a word processor, a spreadsheet, an accounting application, a web browser, a media player, an aeronautical flight simulator, a console game or a photo editor.[15]
The term "app" is a shortening of the term "application software".[16]
Native mobile apps often stand in contrast to software applications that run on desktop computers, and with web applications which run in mobile web browsers rather than directly on the mobile device.[17]
Apps that are not pre installed are usually available through distribution platforms called app stores. They began appearing in 2008 and are typically operated by the owner of the mobile operating system, such as the Apple App Store, Google Play, Windows Phone Store, and BlackBerry App World.[18]
Computers at home are no longer limited to just desktops and laptops. Now many home appliances, such as thermostats, home entertainment systems and home security systems are controlled by computer resulting it what is called a smart home.[19]
Portable computers are not just laptops, they also include, but are not limited to, smart phones, smart watches and tablets.[20]
Children as young as kindergarten are using computers at school. This helps develop fundamental skills needed later in life.[21]
Tablets provide an instantaneous connection between parents, students, and teachers. It may be easy to lose a handwritten note or assignment, but as the tablet goes back and forth between home and school, parents can monitor their student’s assignments, teachers can notify parents, and all around connections can be sustained.[source?]
A set of computer programs designed to permit the user to perform a group of coordinated functions, tasks, or activities.[22]
cell phone
See smartphone
computer programming
The process of developing and implementing various sets of instructions to enable a computer to do a certain task.[23]
data (raw data)
A collection of numbers or characters used as input to a system.[24]
data processing
The collection and manipulation of items of data (input) to produce meaningful information (output).[25]
desktop computer
A personal computer in a form intended for regular use at a single location due to its size and power requirements.[26]
digital divide
An economic and social inequality with regard to access to, use of, or impact of information and communication technologies.[27]
electronic mail (email or e-mail)
A method of exchanging digital messages from an author to one or more recipients.[28]
embedded system
A computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints.[29]
hardware
Physical parts or components of a computer. It includes all the parts inside a computer and is tangible.[30]
industrial age
A period characterized by an economy organized for the purpose of manufacturing.[31]
Industrial Revolution
The transition to new manufacturing processes that included going from hand production methods to factories and machines.[32]
information age
A period characterized by an economy based on computerization.[33]
information
Output from a system that gives the answer to a question of some kind.[34]
information system (IS)
A set of components for collecting, creating, storing, processing and distributing information.[35]
integrated circuit (aka Silicon Chip)
A set of electronic circuits on a small plate or "chip" of semiconductor material, normally silicon.[36]
Internet
A global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide.[37]
laptop computer
A portable personal computer with a clamshell form factor, suitable for mobile use.[38]
mainframe computer
Computers used primarily by large organizations for critical applications, bulk data processing such as census, industry and consumer statistics, enterprise resource planning and transaction processing.[39]
microprocessor
A computer processor that incorporates the functions of a computer's central processing unit (CPU) on a single integrated circuit (IC), or at most a few integrated circuits.[40]
mobile app
A computer program designed to run on mobile devices such as smartphones and tablet computers.[41]
Moore's Law
The observation that the number of transistors in a dense integrated circuit has doubled approximately every two years.[42]
netbook
A generic name given to a category of small, lightweight, legacy-free, and inexpensive computers.[43]
netiquette (Internet or network etiquette)
A set of social conventions that facilitate interaction over networks.[44]
network
A telecommunications network which allows computers to exchange data.[45]
notebook computer
A generic name given to a category of small, lightweight, legacy-free, and inexpensive computers that were introduced in 2007.[46]
operating systems (OS)
Collection of software that directs a computer's execution of other programs, manages storage, input/output, and communication resources.[47]
paradigm shift
A fundamental change in the basic concepts and experimental practices of a scientific discipline.[48]
peripheral
An auxiliary device that connects to and works with the computer in some way.[49]
personal computer
A general-purpose computer whose size, capabilities and original sale price make it useful for individuals, and is intended to be operated directly by an end-user operated by a microprocessor.[50]
server
A computer that provides other network-connected computers with access to data and programs.[51]
Silicon Valley
A nickname for the southern portion of the San Francisco Bay Area, which is home to many of the world's largest high-tech corporations, as well as thousands of tech startup companies.[52]
smart phone
A mobile phone with an advanced operating system which combines features of a personal computer operating system with other features useful for mobile or handheld use.[53]
supercomputer
A computer with a high-level computational capacity used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modeling and physical simulations.[54]
system software
Computer software designed to provide services to other software such as operating systems.[55]
tablet computer
A type of portable PC that de-emphasizes the use of traditional input devices (such as a mouse or keyboard) by using a touchscreen display, which can be controlled using either a stylus pen or finger.[56]
terminal
An electronic or electromechanical hardware device that is used for entering data into, and displaying data from, a computer or a computing system.[57]
thin client
A computer or computer program that depends heavily on another computer to fulfill its computational roles.[58]
timesharing
The sharing of a computing resource among many users by means of multiprogramming and multi-tasking.[59]
transistor
A semiconductor device used to amplify and switch electronic signals and electrical power. It is the fundamental building block of modern electronic devices.[60]
web browser
A software application for retrieving, presenting, and traversing information resources on the World Wide Web.[61]
workstation
A special computer designed for technical or scientific applications and intended primarily to be used by one person at a time.[62]
World Wide Web
An information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet.[63]
Today's world runs on computers. Computers are _____. Having one at home allows you to _____.
Today's world runs on computers. Computers are efficient. Having one at home allows you to access the most informative tool known to mankind.
Computers are used _____.
Computers are used at home, in education, and in work environments.
Computer types include _____.
Computer types include embedded computers, mobile devices, personal computers, midrange servers, mainframe computers, and supercomputers.
An embedded computer is _____.
An embedded computer is a mini computer with a specific function within a product that completes detailed tasks or jobs for that product.
Portable computers are _____.
Portable computers are compact and fully functioning versions of a regular desktop computer that are designed to be mobile. They allow freedom to move around while still being productive. Their mobility alongside their ability to operate similar to a desktop make them powerful tools for businessmen, students, and common individuals alike.
Mainframe computers are _____.
Mainframe computers are much larger computers that consolidate the needs of large organizations like universities, hospitals, banks, government offices, etc.
Data are essentially _____.
Data are essentially the raw facts that are usually typed into a computer.
Information is _____.
Information is the output. The computer calculates the data and spits out the information.
The term hardware refers to _____.
The term hardware refers to the components used to build a computer. Breaking down the components into categories, you will find five main groups: input, output, memory, CPU, and communications hardware.
Communications hardware is important when _____.
Communications hardware is important when it comes to letting computer users access information from the Internet, put information onto the Internet, or interact with other computer users on a network.
Most personal computers are made up of _____.
Most personal computers are made up of a central processing unit, control circuitry on an integrated circuit, and various input/output devices.
A URL uniquely identifies _____. The URL is composed of _____.
A URL uniquely identifies a specific Web page. The URL is composed of a communication protocol, (typically HTTP or HTTPS,) a domain name, and a page.
Domain names are like _____.
Domain names are like fingerprints; two of the same cannot exist.
Certain webpages have specific programs and algorithms that sort through the vast expanse of information available on the web. These websites work by _____.
Certain webpages have specific programs and algorithms that sort through the vast expanse of information available on the web. These websites work by processing keywords that are typed into the search bar and display a large list of webpages matching the keywords.
When communicating online, it is important to remember _____, and to follow _____.
When communicating online, it is important to remember you are interacting with a human being, and to follow netiquette guidelines.
The integrity factor is important when _____.
The integrity factor is important when searching the Internet. Always verify the credibility of the information given.
Advantages of computer use include _____.
Advantages of computer use include improved efficiency, quality, communication, and collective knowledge.
Disadvantages of computer use include _____.
Disadvantages of computer use include excessive use, security and privacy concerns.
Some examples of home computers, besides desktops and laptops are _____, _____ and _____.
Computers at home are no longer limited to just desktops and laptops. Now many home appliances, such as thermostats, home entertainment systems and home security systems are controlled by computer resulting it what is called a smart home.
Portable computers include _____, _____ and _____.
Portable computers are not just laptops, they also include, but are not limited to, smart phones, smart watches and tablets.
School age children are using computers to help _____.
Children as young as kindergarten are using computers at school. This helps develop fundamental skills needed later in life.
A tablet is a _____.
A tablet is a small portable computer that accepts input directly onto its screen rather than via a keyboard or mouse.
Hardware refers to the physical parts or components of a computer. System hardware includes components such as the CPU, hard disk drive, graphic cards, sound cards, RAM, power supply unit, motherboard, etc.[1] This lesson covers internal system components. Peripherals, such as keyboards, displays, pointing devices, and printers, are covered in the next lesson.
Run the System Information or List Hardware utility for your operating system:
Windows: Review Microsoft: What is System Information?. Run System Information on Windows and observe the System Summary, Hardware Resources, Components, and Software Environment available on the system.
Create an inventory list of all internal hardware components in your system. Using your preferred hardware vendor, check the hardware specifications for a new system. How recent is your hardware? Is the same technology still in use on current systems?
Review the Consumer Reports "Computer Buying Guide". Visit your favorite computer retailer's website and go "shopping" for a new computer or familiarize yourself with the hardware of a computer at PCPartPicker and build your own system.
To understand how a CPU works, review MathsIsFun: Binary, Decimal and Hexadecimal Numbers and MathsIsFun: Binary to Decimal to Hexadecimal Converter. Experiment with converting decimal values to hexadecimal and binary, and then back to decimal again. Then use your operating system's calculator and change the view to programmer mode. Perform simple math calculations in binary and hexadecimal. Convert the values to decimal to check your work.
Research computer hardware market share. Which companies are the top three vendors for business computers, personal computers, laptops, tablets, and smartphones? Are hardware companies successful in all markets, or do they specialize and target specific opportunities?
Research the average lifespan of computer hardware. Compare performance and costs for current high-end, middle-of-the-pack, and entry-level systems. Which systems provide the best return on investment when considering performance and expected lifespan?
Moore's law theory has suggested that the speed of computer processors would double every two years. How do you predict the future of computer processors?
After you created an inventory list of the internal hardware components in your system, what components would you upgrade on your computer? Research, identify and support your reasons for upgrading these different hardware components.
System hardware is a general term for various physical components of a computer system. It includes all the parts inside the computer case such as the CPU, hard disk drive, graphic cards, sound cards, RAM, power supply unit, motherboard, etc. Computer hardware is what you can physically touch.[1]
The central processing unit, or CPU, is that part of a computer which executes software program instructions.[3]
The power supply unit, or PSU, converts general purpose electric current from the mains to direct current for the other components of the computer. Appropriate PSU capacity is dependent on power required to run system hardware [4]
A PC's main memory is a fast storage area that is directly accessible by the CPU, and is used to store the currently executing program and immediately needed data. PCs use semiconductor random access memory (RAM) of various kinds such as DRAM, SDRAM or SRAM as their main memory.[5]
Mass storage devices such as hard drives store programs and data even when the power is off; they do require power to perform read and write functions during usage.[6]
Optical drives, including CD, DVD, and Blu-ray Disc, are data storage devices using rapidly rotating discs coated with reflective material and read using a laser diode.[7][8]
Hard disk drives (HDD) are data storage devices used for storing and retrieving digital information using rapidly rotating disks (platters) coated with magnetic material.[9]
Solid state drives (SSD) are data storage devices using integrated circuit assemblies as memory to store data persistently.[10]
Video cards—otherwise called graphics cards, graphics adapters or video adapters—process the graphics output from the motherboard and transmit it to the display. Dedicated video cards are components that are entirely separate from the CPU, while integrated graphics are graphics processes that are handled within the CPU[11]
A network interface controller (NIC, also known as a network interface card, network adapter, LAN adapter, and by similar terms) is a computer hardware component that connects a computer to a computer network.[12]
The motherboard, also referred to as system board or main board, is the primary circuit board within a personal computer, and other major system components plug directly onto or cable into the motherboard.[13]
Computer architecture consists of different computer designs used for specific tasks, including, but not limited to: smartphones, tablets, laptops, desktop computers, super computers, and mainframe computers.[14]
The Unified Extensible Firmware Interface (UEFI) is the latest successor to the Basic Input/Output System (BIOS) to build on and address any technical shortcomings.[15]
The cooling systems help dissipate the heat generated by the hardware to provide optimal operating temperatures and therefore performance.[16]
A set of rules and methods that describe the functionality, organization and implementation of computer systems.[17]
ASCII (American Standard Code for Information Interchange)
An eight-bit character encoding scheme used on personal computing devices.[18]
backward compatible
Products designed for a new standard that can also receive, read, view or play older standards or formats.[19]
bay
A standard-sized area for adding hardware to a computer.[20]
binary
A system of representing letters, numbers or other characters using the digits 0 and 1.[21]
bit
The basic unit of information in computing and digital communications which can have only one of two values, most commonly represented as either a 0 or 1.[22]
bus
A communication system that transfers data between components inside a computer, or between computers.[23]
byte
A unit of digital information in computing and telecommunications that consists of eight bits, permitting the values 0 through 255 and used to encode a single character of text.[24]
cache
A component that stores data so future requests for that data can be served faster.[25]
cluster
A set of loosely or tightly connected computers that work together so that, in many respects, they may be viewed as a single system.[26]
cooling system
A passive or active system in a computer that helps regulate and dissipate the heat generated to maintain optimal temperature and thereby performance.[27]
computer
central processing unit (CPU)A general-purpose device that can be programmed to carry out a set of arithmetic or logical operations automatically.[28]
CPU (Central Processing Unit)
The electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions.[29]
data
A set of values of qualitative or quantitative variables identified as individual pieces of information.[30]
digital
Data that is represented using discrete (discontinuous) values.[31]
EB (Exabyte)
A unit of digital information equal to 1018 (1 quintillion) bytes.[32]
An 8-bit character encoding scheme used mainly on IBM mainframe and IBM midrange computer operating systems.[33]
expansion card
A printed circuit board that can be inserted into an electrical connector, or expansion slot on a computer motherboard, backplane or riser card to add functionality to a computer system.[34]
file
A resource for storing information, which is available to a computer program and is usually based on some kind of durable storage.[35]
FireWire
An interface standard for a serial bus for high-speed communications and isochronous real-time data transfer developed by Apple and replaced with Thunderbolt.[36]
firmware
The combination of a hardware device, e.g. an integrated circuit, and computer instructions and data that reside as read-only software on that device.[37]
GB (Gigabyte)
A unit of digital information equal to 109 (1 billion) bytes.[38]
GHz (Gigahertz)
A unit of frequency defined as 109 (1 billion) cycles per second.[39]
GPU (Graphics Processor Unit)
A specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display.[40]
hardware
The collection of physical elements that constitutes a computer system.[41]
heat sink
A passive heat exchanger that transfers the heat generated by an electronic or a mechanical device to a fluid medium, often air or a liquid coolant, where it is dissipated away from the device, thereby allowing regulation of the device's temperature at optimal levels.[42]
Hertz (Hz)
A unit of frequency defined as one cycle per second.[43]
information
That which may be derived from data and knowledge.[44]
input
Signals or data received by a computing system.[45]
KB (Kilobyte)
A unit of digital information equal to 103 (1 thousand) bytes.[46]
MB (Megabyte)
A unit of digital information equal to 106 (1 million) bytes.[47]
memory
Primary storage devices used to store information for immediate use in a computer.[48]
MHz (Megahertz)
A unit of frequency defined as 106 (1 million) cycles per second.[49]
microprocessor
A multipurpose, programmable device that accepts digital data as input, processes it according to instructions stored in its memory, and provides results as output[50]
motherboard (PCB)motherboard
The main printed circuit board (PCB) found in computers and other expandable systems.[51]
multicore processor
A single computing component with two or more independent processing units.[52]
multiprocessing
The use of two or more central processing units (CPUs) within a single computer system.[53]
multitasking
A concept of performing multiple processes by executing them concurrently.[54]
nanotechnology
The manipulation of matter on an atomic, molecular, and supramolecular scale.[55]
optical computer
A computing device that uses photons rather than electrons for computation.[56]
Computer hardware is a collection of physical elements that make up a computer system.
System hardware consists of _____.
System hardware consists of the physical parts of a computer such as the CPU, hard disk drive, graphic cards, sound cards, RAM, power supply unit, motherboard, etc.
The central processing unit, or CPU, is that part of a computer which _____.
The central processing unit, or CPU, is that part of a computer which executes software program instructions.
The power supply unit, or PSU, converts _____ to _____.
The power supply unit, or PSU, converts general purpose mains Alternating Current to low voltage regulated Direct Current for the internal components of the computer.
A PC's main memory is _____, and is used to _____.
A PC's main memory is a fast storage area that is directly accessible by the CPU, and is used to store the currently executing program and immediately needed data.
Mass storage devices such as _____ store _____.
Mass storage devices such as hard drives store programs and data even when the power is off; they do require power to perform read and write functions during usage.
Optical drives, including _____, are _____.
Optical drives, including CD, DVD, and Blu-ray Disc, are data storage devices using rapidly rotating discs coated with reflective material and read using a laser diode.
Hard disk drives (HDD) are _____.
Hard disk drives (HDD) are data storage devices used for storing and retrieving digital information using rapidly rotating disks (platters) coated with magnetic material.
Solid state drives (SSD) are _____.
Solid state drives (SSD) are data storage devices using integrated circuit assemblies as memory to store data persistently.
Video cards—otherwise called _____—process _____ and transmit it to _____.
Video cards—otherwise called graphics cards, graphics adapters or video adapters—process the graphics output from the motherboard and transmit it to the display.
A network interface controller (NIC, also known as _____) is a _____.
A network interface controller (NIC, also known as a network interface card, network adapter, LAN adapter, and by similar terms) is a computer hardware component that connects a computer to a computer network.
The motherboard, also referred to as _____ is the _____.
The motherboard, also referred to as the main printed circuit board (PCB), is the primary circuit board within a personal computer. Other major system components plug directly into the motherboard.
What role does the Basic Input Output System (BIOS) play in the systems hardware?
The BIOS is used to assist in configuring and identifying hardware such as hard drives, CPU, and memory in a computer.
Create an inventory list of all peripherals available on your system. Include separate categories for input, output, and storage.
Create an inventory list of all connectors available on your system. Note which peripherals use each connector type.
Research and identify options not included in your system's current configuration. Are there options you could add that would make you more productive?
Windows: Run the Notepad application and use the Character Map utility to select special characters and paste them into Notepad.
macOS: Run the TextEdit application and insert special characters into the text file.
Linux: Run the gedit application and use the GNOME Character Map utility to select special characters and paste them into gedit.
Review Wikipedia: ASCII and Wikipedia: Alt code. On a PC, open Notepad and then use Alt codes to enter the ASCII value for the characters in your first name. Observe how the ASCII values are converted into standard display characters just as if you had typed those characters on the keyboard.
Identify common computer peripherals in use in your work and personal environments. What devices are in use? How are they connected (built-in, wired, wireless)? What device or devices could you add to increase productivity?
Research cloud computing services and cloud storage. Identify ways in which cloud services are replacing or have replaced peripherals in your work and home environments. What cloud services could you add to increase reliability or productivity?
There are many peripherals that go along with making a computer function as it should. Input devices, such as the mouse and keyboard are peripherals referred to as input because they are some of the many parts used to input, enter or give information, data, and instructions to the computer. Output peripheral devices such as the printer and headphones, help to get information out of the computer. Finally, there are devices with the dual functionality of input/output, such as the external hard drive or USB flash drives. These are able to be used to both send or store and receive or retrieve information to/from your computer.
Peripherals are auxiliary devices used for computer input (keyboards, pointing devices, etc.), output (monitors, printers, etc.), or data storage (hard drives, flash drives, etc.).[3]
Peripherals are ancillary components used to put information into a computer and as a way to get information out of a computer.[4]
Output devices are different instruments of computer hardware used to transfer commands from the user to the computer to store data, follow user commands, and perform computer tasks..[8]
Devices include headphones, monitors, speakers, wireless devices, touchscreens, etc..[9]
Output device is any peripheral that receives data from a computer.[10]
Combined input / output devices are the pieces of hardware used by a human (or other system) to communicate with a computer. .[11]
Data storage devices are used to transfer data from one computer source to the other. You may also use these devices for recording and storing information for future use and retrieval.[12]
There are two types of storage devices that computers use, primary devices like RAM, and secondary devices like discs. The primary memory or storage is the brain of the computer where data can be stored for fast access. If the computer isn't running, all the data stored will be lost. However, with secondary memory, data is stored on a long term basis on devices like hard disk drive, DVD or CD, Flash drives, memory cards etc.[13]
External devices, like solid state and hard disk drives, connect to the motherboard through an external USB or other port, providing extra storage space with the convenience of mobility.[14]
External devices usually have a larger capacity to store enough data since primary devices can't. They also ensure the data stored is backed up and back up sources should be made known to most staff so that when need arises, data can be retrieved by anyone present at that time the data stored is backed up and these back up sources should be made known to most staff and trained on how to access them so that when need arises, data can be retrieved by anyone present at that time.[15]
Rotating optical storage devices, such as CD and DVD drives, have even longer access times. Other examples of secondary storage technologies includeUSB flash drives floppy disks, magnetic tape, paper tape, punched cards, and RAM disks.[16]
An electronic device that can read and decode barcodes and send the result to a computer through the device's output port.[17]
biometric reader
Measures biological traits such as eyes, fingerprints, voice and face in an attempt to identify someone.[18]
Blu-Ray (BD-ROM)
A digital optical disc data storage format designed to supersede the DVD format, with a storage capacity of 25 GB per layer, and dual layer discs (50 GB) being the industry standard for high definition (1080p) feature-length video discs.[19]
Bluetooth
A wireless technology standard for exchanging data over short distances from fixed and mobile devices, and building personal area networks (PANs).[20]
CD (Compact Disc)
A digital optical disc data storage format originally developed to store and play only sound recordings (CD-DA), but was later adapted for storage of data (CD-ROM), with a storage capacity of 737 MB.[21]
CD-ROM (Compact Disc Read-Only Memory)
A pre-pressed optical compact disc which contains data and is not writable or erasable.[22]
CD-RW (Compact Disc-ReWritable)
A compact disc that can be written, read arbitrarily many times, erased and written again.[23]
CRT (Cathode Ray Tube)
A vacuum tube containing one or more electron guns, and a fluorescent screen used to view images.[24]
digital camera
A camera that encodes digital images and videos digitally and stores them for later reproduction.[25]
digitize
Represent an object, image, sound, document or signal (usually an analog signal) by generating a series of numbers that describe a discrete set of its points or samples.[26]
display resolution
The number of distinct pixels in each dimensions that can be displayed on a device.[27]
dot-matrix printer
A type of computer printing which uses a print head that moves back and forth, or in an up and down motion, on the page and prints by impact, striking an ink-soaked cloth ribbon against the paper, much like the print mechanism on a typewriter.[28]
DVD
A digital optical disc storage format with a storage capacity of 4.7 GB for a single-layered, single-sided disc and 8.5 GB for a dual-layered, single-sided disc.[29]
ergonomic keyboard
A computer keyboard designed with ergonomic considerations to minimize muscle strain and related problems.[30]
ergonomics
The practice of designing products, systems or processes to take proper account of the interaction between them and the people who use them.[31]
external drive
A data storage device used for storing and retrieving digital information, connected via USB, eSATA, FireWire, or Thunderbolt.[32]
fax (short for facsimile)
The telephonic transmission of scanned printed material.[33]
fax modem
Enables a computer to transmit and receive documents as faxes on a telephone line.[34]
FireWire (IEEE 1394)
An interface standard for a serial bus for high-speed communications and isochronous real-time data transfer developed by Apple and replaced with Thunderbolt.[35]
flash drive
A data storage device that includes flash memory, typically with an integrated Universal Serial Bus (USB) interface.[36]
flatscreen display / flat panel display
A light, thin display usually based on LCD technologies, and back-lit to make them easier to read in bright environments.[37]
graphics tablet
A computer input device that enables a user to hand-draw images, animations and graphics, with a special pen-like stylus, similar to the way a person draws images with a pencil and paper.[38]
handwriting recognition
The ability of a computer to receive and interpret intelligible handwritten input from sources such as paper documents, photographs, touch-screens and other devices.[39]
heads-up display
Any transparent display that presents data without requiring users to look away from their usual viewpoints.[40]
hot swap
The ability to replace computer system components without shutting down the system.[41]
impact printer
Uses a print head that either hits the surface of the ink ribbon, pressing the ink ribbon against the paper (similar to the action of a typewriter), or hits the back of the paper, pressing the paper against the ink ribbon.[42]
ink-jet printer
A type of computer printer that recreates a digital image by propelling droplets of ink onto paper, plastic, or other substrates.[43]
joystick
An input device consisting of a stick that pivots on a base and reports its angle or direction to the device it is controlling.[44]
keyboard
A typewriter-style device, which uses an arrangement of buttons or keys, to act as mechanical levers or electronic switches.[45]
laser printer
An electrostatic digital printing process that passes a laser beam back & forth over an electron-charged, cylindrical drum, to define a deferentially-charged image.[46]
LCD (liquid-crystal display)
A flat panel display, electronic visual display, or video display that uses the light modulating properties of liquid crystals. Liquid crystals do not emit light directly.[47]
line printer
An impact printer in which one line of text is printed at a time.[48]
magnetic tape
A medium for magnetic recording, made of a thin magnetizable coating on a long, narrow strip of plastic film.[49]
MICR (magnetic ink character recognition)
A character-recognition technology used mainly by the banking industry to ease the processing and clearance of checks and other documents.[50]
memory card
An electronic flash memory data storage device used for storing digital information, commonly used in many electronic devices, including digital cameras, mobile phones, laptop computers, MP3 players and video game consoles.[51]
microphone
An acoustic-to-electric transducer or sensor that converts sound in air into an electrical signal.[52]
MIDI (Musical Instrument Digital Interface)
A technical standard that describes a protocol, digital interface and connectors and allows a wide variety of electronic musical instruments, computers and other related devices to connect and communicate with one another.[53]
modem
A device that modulates signals to encode digital information and demodulates signals to decode the transmitted information.[54]
A pointing device that detects two-dimensional motion relative to a surface.[56]
multi-function printer (MFP)
An office machine which incorporates the functionality of multiple devices in one, including printer, scanner, photocopier, fax, and e-mail.[57]
multi-touch
Technology that enables a surface to recognize the presence of more than one or two points of contact with the surface.[58]
OCR
The mechanical or electronic conversion of images of typewritten or printed text into machine-encoded text.[59]
open architecture
A type of computer architecture or software architecture that is designed to make adding, upgrading and swapping components easy.[60]
optical disk drive
A disk drive that uses laser light or electromagnetic waves within or near the visible light spectrum as part of the process of reading or writing data to or from optical discs.[61]
optical mark reader
A device used to capture human-marked data from document forms such as surveys and tests.[62]
parallel port
A communication interface based on a 25-pin connector, also known as a printer port or Centronics port.[63]
pixel
A physical point in a raster image, or the smallest addressable element in an all points addressable display device; so it is the smallest controllable element of a picture represented on the screen.[64]
plotter
A wide format printer for printing vector-based graphics.[65]
POS terminal (Point of Sale terminal)
A device which processes customer payments in exchange for goods or after provision of a service.[66]
printer
A peripheral which makes a persistent human readable representation of graphics or text on paper or similar physical media.[67]
RFID
The use of wireless electromagnetic fields to transfer data, for the purposes of identifying and tracking objects.[68]
random access
The ability to access an item of data at any given coordinates in a population of addressable elements.[69]
repetitive strain injury
Injury to the musculoskeletal and nervous systems that may be caused by repetitive tasks, forceful exertions, vibrations, mechanical compression, or sustained or awkward positions.[70]
Retina Display
A brand name used by Apple for screens that have a higher pixel density than their previous models.[71]
scanner
A device that optically scans images, printed text, handwriting, or an object, and converts it to a digital image.[72]
sensor
A device whose purpose is to detect events or changes in its environment, and then provide a corresponding output.[73]
sequential access
The ability to access a group of data elements in a predetermined, ordered sequence.[74]
solid-state drive (SSD)
A device that uses integrated circuit assemblies as memory to store data persistently.[75]
serial port
A communication interface through which information transfers in or out one bit at a time and based on a 9-pin connector.[76]
speaker
A device which converts an electrical audio signal into a corresponding sound.[77]
stylus pen
A computer accessory used to assist in navigating or providing more precision when using a touchscreen.[78]
tape drive
A data storage device that reads and writes data on a magnetic tape.[79]
thermal printer
A digital printing device which produces a printed image by selectively heating coated thermochromic paper, primarily used for label printing.[80]
touchscreen
An input device normally layered on the top of an electronic visual display of an information processing system.[81]
touchpad
A pointing device featuring a tactile sensor, a specialized surface that can translate the motion and position of a user's fingers to a relative position on the operating system that is outputted to the screen.[82]
trackball
A stationary pointing device consisting of a ball held by a socket containing sensors to detect a rotation of the ball about two axes.[83]
TrackPoint (pointing stick)
An isometric joystick used as a pointing device and typically mounted in a computer keyboard.[84]
uninterruptible power supply (UPS)
An electrical apparatus that provides emergency power to a load when the input power source, typically main power, fails.[85]
USB
An industry standard that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices communicating at 12 Mbps, 480 Mbps, 5 Gbps, or 10 Gbps.[86]
video projector
A device that receives a video signal and projects the corresponding image on a projection screen using a lens system.[87]
webcam
A video camera that feeds or streams its image in real time to or through a computer to a computer network.[88]
wireless
The use of radio waves in place of cables allowing peripheral devices to transfer information to and from a computer through a transmitter in the device and a receiver plugged into the computer, usually in the form of a USB dongle.[89]
Peripherals are _____ used for _____, _____, or _____.
Peripherals are auxiliary devices used for computer input (keyboards, pointing devices, etc.), output (monitors, printers, etc.), or data storage (hard drives, flash drives, etc.).
Input devices include _____, _____, _____, _____, and _____.
Input devices include keyboards, pointing devices, scanners, microphones, and webcams.
Output devices include _____, _____, _____, and _____.
Output devices include monitors, projectors, printers, and speakers.
Combined input / output devices include _____ and _____.
Combined input / output devices include fax and touchscreen displays.
Data storage devices include _____, _____, _____, _____, _____, and _____.
Data storage devices include hard drives, flash drives, optical drives, Network Attached Storage (NAS), media players, and smart phones.
External hard drives, including _____ and _____, connect to the motherboard through ____, providing _____.
External hard drives, including solid state and hard disk drives, connect to the motherboard through an external USB or other port, providing extra storage space with the convenience of mobility.
An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating system is a vital component of the system software in a computer system. Application programs usually require an operating system to function.[1]
Linux: Download and install VNC Viewer and then test different Linux distributions using distrotest.net. Popular Linux desktop distributions include Ubuntu, Linux Mint, and Fedora.
VirtualBox - Software - This link will take you to the Oracle VM VirtualBox software - you can download this for free and essentially "make your own machine" virtually to test out different components of a device - higher skill level recommended.
Research operating systems in use in your work and personal environments. Consider server-based systems, personal computers, tablets, smartphones, and wearable devices. Are the operating systems proprietary or open-source? Does each provider charge for the operating system? If not, what do they receive in return for their efforts?
Compare PC-based operating systems (Windows, macOS, Unix/Linux) and mobile operating systems (Android, ChromeOS, iOS). Describe advantages and disadvantages of each. Which operating system(s) do you prefer, and why.
Research and compare different PC-based operating system functions. What is the purpose between the operating system and the computer hardware? Describe a few tasks that you frequently perform using your operating system, and why.
An operating system is a software that manages computer hardware and software resources and provides common services for computer programs. Operating systems are crucial to system software as most applications require an OS to run.[4].
The operating system allows you to communicate with the computer without knowing how to speak the computer language. The basic goal of an operating system is to carry out user programs and make the burden easier. In other words, it provides an interface between the user and the system.[5]
Hardware functions such as input & output and memory allocation, the operating system acts as an intermediary between application programs and the computer hardware.
The operating system coordinates all of the hardware and software components on the computer to make sure each program gets what it needs..[6]
The operating system provides an environment for software applications like spreadsheets, word processors and database programs to function. For instance, word processors create, edit, save and print documents. [7]
The operating system monitors system health and functionality of the computer by providing a file structure for data management.[8]
Popular computer operating systems include Windows, macOS/macOS, Linux, and Chrome OS, with Windows 7 being the most popular operating system for desktop and laptops.[9][10]
A mobile operating system, also referred to as mobile OS, is an operating system that operates a smartphone, with Android being the most popular smartphone operating system and IOS as the most popular tablet operating system, PDA, or other mobile devices.[11]
Popular distributions of Linux include Red Hat, Debian, Ubuntu, Linux Mint and Google's Android.[13]
Open-source software is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose.[14]. Examples of the open-source software include internet browsers like Mozilla Firefox, LibreOffice and Google Chrome.[source?]
Proprietary software or closed source software is computer software licensed under exclusive legal right of the copyright holder with the intent that the licensee is given the right to use the software only under certain conditions, and restricted from other uses, such as modification, sharing, studying, redistribution, or reverse engineering.[15]
A real-time operating system (RTOS) is an operating system intended for applications with fixed deadlines (real-time computing). This is completed by a core switching rapidly between tasks without buffer delays. [16]
A computer architecture that supports at most 32-bit integers, memory addresses, and other data units, limiting integer values to -2,147,483,648 through 2,147,483,647 and memory addresses to 4 GiB (gigabytes or gibibytes).[17]
64-bit
A computer architecture that supports at most 64-bit integers, memory addresses, and other data units, limiting integer values to over 18 quintillion and memory addresses to 16 EiB (exbibytes).[18]
agent
A computer program that acts on behalf of a user or other program.[19]
Android
A mobile operating system (OS) based on the Linux kernel and currently developed by Google.[20]
BlackBerry OS
A proprietary mobile operating system developed by BlackBerry Ltd for its BlackBerry line of smartphone handheld devices.[21]
A means of interacting with a computer program where the user issues commands to the program in the form of successive lines of text.[23]
compatibility
The ability to run software on a given system.[24]
copyright
Used by proprietary software companies to prevent the unauthorized copying of their software and by open source licenses to enforce their terms.[25]
cross-platform
An attribute conferred to computer software or computing methods and concepts that are implemented and inter-operate on multiple computer platforms.[26]
daemon
A daemon is a long-running computer program that runs as a background process. Examples of this would be inted, httpd, mysqld, and snmpd.[27]
device driver
A computer program that operates or controls a particular type of device that is attached to a computer, specifically hardware devices [28]
disk operating system (DOS)
An acronym for several computer operating systems that were operated by using the command line.[29]
end-user license agreement (EULA)
The contract between a licensor and purchaser, establishing the purchaser's right to use software.[30]
file manager
A computer program that provides a user interface to manage files and folders.[31]
formatting
The process of preparing a data storage device such as a hard disk drive, solid-state drive, floppy disk or USB flash drive for initial use.[32]
fragmentation
Occurs when a file system cannot or will not allocate enough contiguous space to store a complete file as a unit, but instead puts parts of it in gaps between existing files.[33]
Google Chrome OS
An operating system based on the Linux kernel and designed by Google to work with web applications and installed applications, initially designed as a pure web thin client operating system.[34]
Graphical User Interface (GUI)
A type of interface that allows users to interact with electronic devices through icons and visual indicators such as secondary notation, instead of text-based user interfaces, typed command labels or text navigation.[35]
iOS
A mobile operating system developed by Apple Inc. and distributed exclusively for Apple hardware, including iPods, iPhones, and iPads.[36]
kernel
A computer program that manages I/O requests from software, and translates them into data processing instructions for the central processing unit and other electronic components of a computer.[37]
Linux
A Unix-like computer operating system assembled under the model of free and open-source software development and distribution.[38]
macOS
A series of graphical user interface–based operating systems developed by Apple Inc. for their Macintosh line of computer systems, currently branded as macOS.[39]
malware (short for malicious software)
Any software intentionally designed to cause damage to a computer, server or computer network.[40]
memory management
Provides ways to dynamically allocate portions of memory to programs at their request, and free it for reuse when no longer needed.[41]
menu bar
A graphical control element that lists options or commands presented to an operator by a computer or communications system.[42]
mobile operating system
An operating system for smartphones, tablets, or other mobile devices (Android, iOS, Windows Phone, and Blackberry).[43]
multi-tasking
Performing multiple tasks over a certain period of time by executing them concurrently.[44]
open source
Computer software with its source code made available with a license in which the copyright holder provides the right to study, change and distribute the software to anyone and for any purpose.[45]
operating system
System software that manages computer hardware and software resources and provides common services for computer programs (Android, iOS, Windows Phone, and Blackberry).[46]
macOS
A series of Unix-based graphical interface operating systems developed and marketed by Apple Inc. designed to run on Mac computers.[47]
paging
A memory management scheme by which a computer stores and retrieves data from the secondary storage for use in main memory.[48]
path
The general form of the name of a file or directory, specifies a unique location in a file system.[49]
platform
Computer hardware architecture, an operating system, and runtime libraries in which a piece of software is designed to run.[50]
root directory
The first or top-most directory in a hierarchy.[51]
real-time operating system (RTOS)
An operating system intended for applications with fixed deadlines (real-time computing). Such applications include some small embedded systems, automobile engine controllers, industrial robots, spacecraft, industrial control, and some large-scale computing systems.[52]
safe mode
A diagnostic mode of a computer operating system (OS). [53]
shell
A user interface used to access an operating system's services.[54]
style
predefined text formatting available in software applications.[source?]
task manager
A system monitor program used to provide information about the processes and programs running on a computer, as well as the general status of the computer.
taskbar
An element of a graphical user interface which typically shows which programs or applications are running on the device, as well as providing links or shortcuts to other programs or places. [55]
Unix
A family of multitasking, multi-user computer operating systems.[56]
user interface
The space where interactions between humans and machines occur.[57]
virtual memory
A memory management technique that is implemented using both hardware and software that maps memory addresses used by a program.[58]
Windows
A metafamily of graphical operating systems developed, marketed, and sold by Microsoft.[59]
x64
The 64-bit version of the x86 instruction set, supporting 64-bit addressing and processing, and fully backwards compatible with 16-bit and 32-bit x86 code.[60]
x86
A family of backward compatible instruction set architectures based on the Intel 8086 through 80486 CPUs supporting 16-bit and 32-bit addressing and processing.[61][62]
Xbox OS
The Xbox One system software, sometimes called the Xbox OS, is the operating system for the eighth-generation home video game console, Xbox One.[63]
An operating system is software that manages computer hardware and software resources and provides common services for computer programs.
The operating system provides an interface between _____.
The operating system provides an Interface between the user and the system.
The operating system coordinates _____.
The operating system coordinates hardware components.
The operating system provides an environment for _____.
The operating system provides an environment for software applications to function.
The operating system monitors _____.
The operating system monitors system health and functionality.
The operating system provides a file structure for _____.
The operating system provides a file structure for data management.
Popular computer operating systems include _____.
Popular computer operating systems include Windows, macOS, Linux, and Chrome OS.
What kinds of devices use a mobile operating system?
A mobile operating system, also referred to as mobile OS, is an operating system that operates a smartphone, tablet, PDA, or other mobile device.
Name the (4) main mobile operating systems (2 popular, 2 less popular)
Popular mobile operating systems include Android, iOS and to a lesser extent Windows Phone and Blackberry.
Name the (5) operating systems that are based on Unix:
macOS, Linux, Android, Chrome OS and iOS are based on Unix.
Name the (5) popular distributions of Linux:
Popular distributions of Linux include Red Hat, Debian, Ubuntu, Linux Mint and Google's Android.
What is Open-source software?
Open-source software is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose.
Proprietary software or closed source software is _____.
Proprietary software or closed source software is computer software licensed under exclusive legal right of the copyright holder with the intent that the licensee is given the right to use the software only under certain conditions, and restricted from other uses, such as modification, sharing, studying, redistribution, or reverse engineering.
What does RTOS stand for and its definition:
A real-time operating system is an operating system intended for applications with fixed deadlines (real-time computing). Such applications include some small embedded systems, automobile engine controllers, industrial robots, spacecraft, industrial control, and some large-scale computing systems.
15. What are the two most common operating systems:
Application Software are the most common programs that run in the foreground of the computer. They tend to perform useful tasks which are not associated with computer maintenance, system boot-up, or hardware communication. Application Software are the most familiar forms of software and come in a variety of types. Most often they can be accessed through the graphical user interface of the operating system being used by double-clicking on an icon. Some of the most popular examples include word processors, spreadsheets, photo-editing programs, database programs, and accounting programs to name a few.[1]
Use screen sharing software to collaborate with other users:
Windows: Search the Internet for information on Chrome Remote Desktop, Microsoft Remote Desktop, TeamViewer, or similar applications. Use one of these applications to share your desktop with another user.
macOS: Search the Internet for information on Chrome Remote Desktop, Microsoft Remote Desktop, TeamViewer, or similar applications. Use one of these applications to share your desktop with another user.
Linux: Search the Internet for information on Chrome Remote Desktop, Microsoft Remote Desktop, TeamViewer, or similar applications. Use one of these applications to share your desktop with another user.
All: Use collaboration features in one or more of the cloud-based office software suites to share and edit documents amongst users in real time.
Use file compression software to compress and uncompress folders and files:
Windows: Review Microsoft: Compress and Uncompress Files. Create a Zip file and compress the text and document files created above. Compare file sizes between the compressed and uncompressed versions.
macOS: Review macOS Daily: How to Zip Files in macOS. Compress the text and document files created above. Compare file sizes between the compressed and uncompressed versions.
Linux: Review Ubuntu.org: File Roller. Use the Archive Manager to create a new .gz or .zip file and compress the text and document files created above. Compare file sizes between the compressed and uncompressed versions.
Use video conferencing software to collaborate with other users:
Windows: Search the Internet for information on Google+ Hangout, Skype, or similar applications. Use one of these applications to set up and join a video conference to collaborate with other users.
macOS: Search the Internet for information on FaceTime, Google+ Hangout, Skype, or similar applications. Use one of these applications to set up and join a video conference to collaborate with other users.
Linux: Search the Internet for information on Google+ Hangout, Skype, or similar applications. Use one of these applications to set up and join a video conference to collaborate with other users.
Back up and restore files.
Create a local system backup to a USB or NAS drive.
Compare proprietary and open-source office productivity suites (Google Apps, iWork, Libre Office, Microsoft Office, Open Office). Describe advantages and disadvantages of each. Which office productivity suite does your school or company use, and why?
Research leading collaboration software (email platforms, shared calendaring or time management, groupware, virtual meeting software, chat, social media, etc.). Identify which platforms or applications are in use in your work and personal environments. Consider whether these applications enhance productivity or detract from it.
An application program (app or application for short) is a computer program designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.[3]
Productivity software, or office productivity software, are application software dedicated to producing information, such as documents, presentations, worksheets, databases, charts, graphs, digital paintings, electronic music and digital video.[4]
Existing office suites contain a wide range of components. Most typically, the base components include a word processor, spreadsheet, and presentation program.[5]
Popular office suites include Apache OpenOffice, LibreOffice, Microsoft Office and Google Docs.[6]
Collaborative software, or groupware, is application software designed to help people involved in a common task to achieve goals. It can be divided into three categories depending on the level of collaboration: communication, conferencing and co-ordination.[7]
Communication can be thought of as unstructured interchange of information. Examples of communication tools include synchronous conferencing, asynchronous conferencing, e-mail, faxing, voice mail, wikis, web publishing, and revision control.[8]
Conferencing refers to interactive work toward a shared goal. Examples of conferencing include Internet forums, online chat, instant messaging, telephones, video conferencing, data conferencing, and application sharing.[9]
Co-ordination refers to complex interdependent work toward a shared goal. Examples of co-ordination include electronic calendars, project management systems, online proofing, workflow systems, knowledge management systems, enterprise bookmarking, prediction markets, extranet, social software, online spreadsheets, and client portals.[10]
Utility software is system software designed to help analyze, configure, optimize or maintain a computer.[11]
Utility software is a type of system software used to support the computer infrastructure, distinguishing it from application software which is aimed at directly performing tasks that benefit ordinary users.[12]
A filename extension is a suffix, separated from the base filename by a dot or space, used to indicate the file's content format or usage.[13]
Mobile apps are becoming more prevalent with the use of smartphones. More people use apps than search the internet: 51.1% vs. 49.8% respectively.[14]
Application software that records and processes accounting transactions within functional modules such as accounts payable, accounts receivable, payroll, and trial balance.[15]
autocorrection
An automatic data validation and replacement function commonly found in word processors and text editing interfaces.[16]
automatic recalculation
A feature which eliminates the need to manually request that a spreadsheet program recalculate values.[17]
autosave
A function in many computer applications or programs which saves an opened document automatically, helping to reduce the risk or impact of data loss in case of a crash or freeze.[18]
bar chart
A chart that presents grouped data with rectangular bars with lengths proportional to the values that they represent.[19]
cell
A unit in a spreadsheet formed by the intersection of a row and a column.[20]
cell address
Alphanumeric code used to identify a spreadsheet cell.[21]
A software license that is based on the number of simultaneous users accessing the program. It typically deals with software running in the server where users connect via the network. For example, in a five-user concurrent use license, after five users are logged on to the program, the sixth user is prohibited.[23]
conferencing
Used as an umbrella term for various types of online collaborative services including web seminars, webcasts, and peer-level web meetings.[24]
database
An organized collection of facts and information such as text and numbers, and often can hold still images, sounds and videos or film clips.[25]
desktop publishing (DTP)
The creation of documents using page layout skills on a personal computer.[26]
electronic paper
Display technologies that mimic the appearance of ordinary ink on paper.[27]
e-reader
A mobile electronic device that is designed primarily for the purpose of reading digital e-books and periodicals.[28]
equation solver
Software used to find values (numbers, functions, sets, etc.) that fulfill a condition.[29]
formula
An expression that automatically calculates and displays a value based on the contents of other spreadsheet cells.[30]
freeware
Copyrighted software that may be used free of charge.[31]
function
A sequence of program instructions that perform a specific task, packaged as a unit.[32]
groupware
Application software designed to help people involved in a common task to achieve goals.[33]
information retrieval
Is the activity of obtaining information resources relevant to an information need from a collection of information resources.[34]
instant messaging
A type of online chat which offers real-time text transmission over the Internet.[35]
justification
A common type of text alignment where the spaces between words are stretched or compressed to align both the left and right ends of each line of text.[36]
line chart
A type of chart which displays information as a series of data points connected by straight line segments.[37]
macro key
A sequence of application or operating system instructions that is recorded or written once and then may be repeated using a keyboard shortcut or application interface button.[38]
mail merge
A software operation describing the production of multiple documents from a single template form and a structured data source.[39]
mathematical software
Software used to model, analyze or calculate numeric, symbolic or geometric data.[40]
modeling
Representing a system using symbols and equations or calculations.[41]
multiuser
A software license that allows more than one person to use the software. See concurrent use license, per seat license and EULA.[42]
open source software
Software programs made up of source code which is made available to the public. i.e. Wikibook.[43]
outliner
A computer program that allows text to be organized into discrete sections that are related in a tree structure or hierarchy and may be collapsed into a node, or expanded and edited.[44]
page-layout software
The primary purpose of page layout software is to make it easy to combine text and graphics when creating layouts for brochures, ads, newsletters, greeting cards, etc.[45]
personal information manager (PIM)
A type of application software that functions as a personal organizer.[46]
pie chart
A circular statistical graphic, which is divided into slices to illustrate numerical proportion.[47]
presentation software
Productivity software used to display information in the form of a slide show.[48]
programming tools
software in the form of programs or applications that software developers (also known as programmers, coders, hackers or software engineers) use to create, debug, maintain, or otherwise support software.[49]
public domain software
A software program which is not copyright so it is accessible to all users and able to be duplicated.[50]
A type of mathematical diagram using Cartesian coordinates to display values for typically two variables for a set of data.[52]
shareware
A type of proprietary software which is provided (initially) free of charge to users, who are allowed and encouraged to make and share copies of the program, which helps to distribute it.[53]
single-user
The authorization that grants one user the right to use a software package. It may grant the user the right to install the software on only one machine, or it may authorize installation on any number of machines as long as that same licensee is the only user.[54]
software
Any set of machine-readable instructions that directs a computer's processor to perform specific operations.[55]
software suite
A group of related programs that interact together and are purchased together.[56]
speech recognition software
Software used for the translation of spoken words into text.[57]
spell checker
Software that flags words in a document that may not be spelled correctly.[58]
spreadsheet software
Productivity software used to perform the organization, analysis and storage of data in tabular form.[59]
stack chart
A bar chart with the bars grouped (stacked) to show cumulative effect.[60]
style
Predefined text formatting available in software applications.[61]
template
A standardized non-executable file type used by computer software as a pre-formatted example on which to base other files, especially documents.[62]
utility program
System software designed to help analyze, configure, optimize or maintain a computer.[63]
web based software
Software that is delivered on demand via the Web; also referred to as Software as Service (SaaS) or cloudware.[64]
wizard
A user interface type that presents a user with a sequence of dialog boxes that lead the user through a series of well-defined steps.[65]
word processing
Productivity software used to perform the composition, editing, formatting, and sometimes printing of any sort of written material.[66]
word wrap
The process of breaking a section of text into lines such that it will fit in the available width of a page, window or other display area.[67]
worksheet
A single array of data in spreadsheet software.[68]
Productivity software, or office productivity software, is application software dedicated to _____.
Productivity software, or office productivity software, is application software dedicated to producing information, such as documents, presentations, worksheets, databases, charts, graphs, digital paintings, electronic music and digital video.
Existing office suites contain a wide range of components. Most typically, the base components include _____.
Existing office suites contain a wide range of components. Most typically, the base components include a word processor, spreadsheet, and presentation program.
The names of some popular office suites are _____.
Popular office suites include Apache OpenOffice, LibreOffice, Microsoft Office and Google Docs.
Collaborative software, or groupware, is application software designed to _____.
Collaborative software, or groupware, is application software designed to help people involved in a common task to achieve goals, such as email, calendaring, text chat, wiki, bookmarking, shared document storage, screen sharing, and video conferencing.
Communication can be thought of as _____. Examples of communication tools include _____.
Communication can be thought of as unstructured interchange of information. Examples of communication tools are synchronous conferencing, asynchronous conferencing, e-mail, faxing, voice mail, wikis, web publishing, and revision control.
Conferencing refers to _____. Examples of conferencing include _____.
Conferencing refers to interactive work toward a shared goal. Examples of conferencing are Internet forums, online chat, instant messaging, telephones, video conferencing, data conferencing, and application sharing.
Co-ordination refers to _____. Examples of co-ordination include _____.
Co-ordination refers to complex interdependent work toward a shared goal. Examples of co-ordination include electronic calendars, project management systems, online proofing, workflow systems, knowledge management systems, enterprise bookmarking, prediction markets, extranet, social software, online spreadsheets, and client portals.
Utility software is system software designed to _____.
Utility software is system software designed to help analyze, configure, optimize or maintain a computer.
Utility software is a type of system software used to support the computer infrastructure, distinguishing it from application software which is _____.
Utility software is a type of system software used to support the computer infrastructure, distinguishing it from application software which is aimed at directly performing tasks that benefit ordinary users.
A filename extension is _____.
A filename extension is a suffix, separated from the base filename by a dot or space, used to indicate the file's content format or usage.
Networking consists of a group of computer systems and computer hardware that connect together through different channels to facilitate sharing and receiving of data and information.[citation needed]
Review MacWorld: Configuring Your Mac's Network Settings Use System Preferences / Network to review network settings for your system. Use the Advanced button and TCP/IP settings to renew your DHCP lease.
Review Wikipedia: ifconfig. Use ifconfig to review network settings for your system.
Experiment with the Wireshark open source packet analyzer. Follow the activities to install Wireshark and capture network traffic. Then view the captured information.
You are interested in setting up an Internet connection on your new computer. Compare and contrast different options on how you can access the Internet. Which type would you prefer to use from your results? Support your answer.
Computer users should be aware of the different wireless security options. Identify different wireless network security vulnerabilities and their potential risks. Discuss solutions to resolve those identified threats.
Explore different network design types. Select one network design type based on performance, hardware, cost and setup requirements. Justify your answers with supported research.
A computer network or data network is a telecommunications network that allows computers to exchange data. Networked computing devices pass data to each other in the form of packets across connections established using either cable or wireless media.[2]
Computer networks support applications such as the access to the World Wide Web, storage servers, printers, and fax machines, and use of email and instant messaging applications. Two devices are said to be networked when they can exchange information between them.[3]
The different networks are nanoscale communication network, personal area network, local area network, home area network, storage area, campus area, backbone network, metro area, enterprise private network, virtual private network, and global area network.
A network packet is a formatted unit of data sent through a network to the destination. Once packets arrive, they are reassembled into their original message.[4]
Wired media includes coaxial cable, twisted-pair cable, and optical fiber.[5]
Wireless local area network connections use spread spectrum technology based on a common flavor of open-standards wireless radio-wave technology defined as IEEE 802.11 and known as Wi-Fi.[6]
A network interface controller (NIC) is hardware that provides a computer with the ability to access the transmission media, and has the ability to process low-level network information.[7]
In Ethernet networks, each NIC has a unique 48-bit Media Access Control (MAC) address.[8]
A repeater or hub is an electronic device that receives a network signal in the form of bits. Most organization have replaced hubs with switches.[9]
A bridge or switch is a device that connects and filters multiple network segments or devices, by forwarding data only to one or multiple devices that need to receive the data based on destination MAC address.[10]
A router is a device that forwards data packets between different computer networks based on the network address (IP address).[11]
A modem is a device used to connect network nodes via wire not originally designed for digital network traffic, by modulating the digital signal to produce an analog signal for transmission.[12]
A firewall is a device used to control network security and access rules by rejecting access requests from unrecognized sources while allowing actions from recognized ones.[13]
An access point is a device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards.[14]
An Internet Protocol address (IP address) is a numerical label assigned to each device participating in a network that uses the Internet Protocol for communication. An IP address serves two principal functions: host identification and network addressing.[15]
IP addresses are 32-bit (IPv4) or 128-bit (IPv6) numbers usually written and displayed in human-readable notations, such as 198.51.100.1 (IPv4), and 2001:db8:0:1234:0:567:8:1 (IPv6).[16]
IP addresses are assigned to a host either anew at the time of booting, or permanently by fixed configuration of its hardware or software. Persistent configuration is also known as using a static IP address. In contrast, in situations when the computer's IP address is assigned newly each time, this is known as using a dynamic IP address.[17]
Static IP addresses are manually assigned to a computer by an administrator.[18]
Dynamic IP addresses are assigned either by the computer interface or host software itself through automatic configuration, or assigned by a server using Dynamic Host Configuration Protocol (DHCP).[19]
A shared resource, or network share, is a computer resource made available from one host to other hosts on a computer network.[20]
In SOHO networks, a decentralized approach is often used, where every user may make their local folders and printers available to others. This approach is sometimes denoted as a workgroup or peer-to-peer network.[21]
In a workgroup, each computer is responsible for its own security, rather than relying on centralized authentication.[22]
Windows 7 and later Microsoft operating systems extend the workgroup with a homegroup option that uses a password to join computers into the group, and allows users' libraries, along with individual files and folders, to be shared between multiple computers.[23]
In larger networks, a centralized file server or print server, sometimes denoted client–server network is typically used. A client process on the local user computer takes the initiative to start the communication, while a server process on the file server or print server remote computer passively waits for requests to start a communication session.[24]
The centralized authentication approach used in larger networks is referred to as a domain, where all user accounts, computers, printers and other security principals, are registered with a central directory service.[25]
Users and network administrators typically have different views of their networks. Users can share printers and some servers from a workgroup, which usually means they are in the same geographic location and are on the same LAN, whereas a Network Administrator is responsible to keep that network up and running.[26]
Network administrators can see networks from both physical and logical perspectives. The physical perspective involves geographic locations, physical cabling, and the network elements (e.g., routers, bridges and application layer gateways) that interconnect via the transmission media. Logical networks, called, in the TCP/IP architecture, subnets, map onto one or more transmission media.[27]
Over the Internet, there can be business-to-business (B2B), business-to-consumer (B2C) and consumer-to-consumer (C2C) communications. When money or sensitive information is exchanged, the communications are apt to be protected by some form of communications security mechanism. Intranets and extranets can be securely superimposed onto the Internet, without any access by general Internet users and administrators, using secure Virtual Private Network (VPN) technology.[28]
The word Cyberspace became popular in the 1990s when the uses of the Internet, networking, and digital communication were all growing dramatically and the term "cyberspace" was able to represent the many new ideas and phenomena that were emerging.[29]
As a social experience, individuals can interact, exchange ideas, share information, provide social support, conduct business, direct actions, create artistic media, play games, engage in political discussion, and so on, using this global network.[30]
Computer networking may be considered a branch of electrical engineering, telecommunications, computer science, information technology or computer engineering, since it relies upon the theoretical and practical application of the related disciplines.[31]
A computer network may be used by computer crackers to deploy computer viruses or computer worms on devices connected to the network, or to prevent these devices from accessing the network via a denial of service attack.[32]
The amount of information that can be sent through a given communication channel in a given amount of time.[33]
blog
A discussion or informational site published on the World Wide Web and consisting of discrete entries ("posts") typically displayed in reverse chronological order (the most recent post appears first).[34]
Bluetooth
A wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz[4]) from fixed and mobile devices, and building personal area networks (PANs).[35]
broadband
A wide bandwidth data transmission with an ability to simultaneously transport multiple signals and traffic types.[36]
chat room
Describes any form of electronic conferencing, but traditionally refers to synchronous text-based communications with a group of users.[37]
client
A piece of computer hardware or software that accesses a service made available by a server.[38]
cyberspace
The notional environment in which communication over computer networks occurs.[39]
coaxial cable
copper or aluminum cables widely used for cable television systems, office buildings, and other work-sites for local area networks.[40]
download
To receive data to a local system from a remote system, or to initiate such a data transfer.[41]
dynamic IP address
An address assigned either by the computer interface or host software itself, or assigned by a server using Dynamic Host Configuration Protocol (DHCP).[42]
Ethernet
A family of computer networking technologies for local area networks (LANs) and metropolitan area networks (MANs), standardized in 1983 as IEEE 802.3.[43]
file server
A computer attached to a network that has the primary purpose of providing a location for shared storage of computer files that can be accessed by workstations attached to the same computer network. [44]
forum
An online discussion site where people can hold conversations in the form of posted messages.[45]
global positioning system (GPS)
A space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the earth where there is an unobstructed line of sight to four or more GPS satellites.[46]
instant messaging (IM)
A type of online chat which offers real-time text transmission over the Internet.[47]
local area network (LAN)
A computer network that interconnects computers within a limited geographic area such as a home, school, computer laboratory, or office building.[48]
mesh network
A network topology in which each node relays data for the network.[49]
network
Telecommunications network which allows computers to exchange data.[50]
network administrator
An individual responsible for the maintenance of computer hardware and software systems that make up a computer network.[51]
network adapter (NIC)
A computer hardware component that connects a computer to a computer network. [52]
Software that implements an operating system of some kind that is oriented to computer networking.[54]
network packet
Formatted unit of data carried by a packet-switched network. Computer communications links that do not support packets, such as traditional point-to-point telecommunications links, simply transmit data as a bit stream. When data is formatted into packets, the bandwidth of the communication medium can be better shared among users than if the network were circuit switched.[55]
network switch
A network switch (also called switching hub, bridging hub,) is a computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.[56]
network topology
Arrangement of the various elements (links, nodes, etc.) of a computer network.[57]
node
A connection point, a redistribution point, or a communication endpoint (e.g. data terminal equipment). The definition of a node depends on the network and protocol layer referred to. A physical network node is an active electronic device that is attached to a network and is capable of creating, receiving, or transmitting information over a communications channel.[1] A passive distribution point such as a distribution frame or patch panel is consequently not a node. [58]
optical fiber
A glass fiber that carries pulses of light that represent data which can be used for long runs of cable carrying very high data rates, and are used for undersea cables to interconnect continents.[59]
packet switching
A digital networking communications method that groups all transmitted data into suitably sized blocks, called packets, that are transmitted via a medium that may be shared by multiple simultaneous communication sessions.[60]
peer-to-peer (P2P) protocol
An application layer distributed networking protocol that can be used to form and maintain an overlay network among participant nodes.[61]
POP Point of presence
An artificial demarcation point or interface point between communicating entities.[62]
protocol
A system of rules that allow two or more entities of a communication system to communicate between them to transmit information via any kind of variation of a physical quantity.[63]
Radio-frequency identification (RFID)
The wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects.[64]
router
A networking device that forwards data packets between computer networks. Routers perform the "traffic directing" functions on the Internet.[65]
static IP address
An address manually assigned to a computer by an administrator.[66]
The computer networking model and set of communications protocols used on the Internet and similar computer networks.[68]
telecommunication
The exchange of information between two or more entities using technology in the form of signals over a physical medium or in the form of electromagnetic waves.[69]
text message
A brief, electronic message sent between two or more mobile phones, or fixed or portable devices over a phone network.[70]
twisted-pair
A type of wiring in which two conductors of a single circuit are twisted together for the purposes of canceling out electromagnetic interference (EMI) from external sources.[71]
upload
The sending of data from a local system to a remote system such as a server or another client with the intent that the remote system should store a copy of the data being transferred, or the initiation of such a process.[72]
virtual private network (VPN)
A private, secure path over the Internet that provides authorized users a secure means of accessing a private network via the Internet.[73]
wide area network (WAN)
A network that covers a broad geographic area using leased telecommunication lines.[74]
WI-Fi
A local area wireless computer networking technology based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards.[75]
wireless access point (AP or WAP)
A device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards. [76]
wireless local area network (WLAN)
Links two or more devices over a short distance using a wireless distribution method.[77]
A computer network or data network is a _____. Networked computing devices pass data to each other in the form of _____ across connections established using _____.
A computer network or data network is a telecommunications network that allows computers to exchange data. Networked computing devices pass data to each other in the form of packets across connections established using either cable or wireless media.
A network packet is a _____. Once packets arrive, they are _____.
A network packet is a formatted unit of data sent through a network to the destination. Once packets arrive, they are reassembled into their original message.
Wired media includes _____, _____, and _____.
Wired media includes coaxial cable, twisted-pair cable, and optical fiber.
Wireless local area network connections use _____ technology based on a common flavor of open-standards wireless radio-wave technology defined as _____ and known as _____.
Wireless local area network connections use spread spectrum technology based on a common flavor of open-standards wireless radio-wave technology defined as IEEE 802.11 and known as Wi-Fi.
A network interface controller (NIC) is _____.
A network interface controller (NIC) is hardware that provides a computer with the ability to access the transmission media, and has the ability to process low-level network information.
In Ethernet networks, each NIC has a unique _____.
In Ethernet networks, each NIC has a unique 48-bit Media Access Control (MAC) address.
A repeater or hub is _____. In local area networks, hubs have been replaced by _____.
A repeater or hub is an electronic device that receives a network signal in the form of bits, cleans it of unnecessary noise, and regenerates it. In local area networks, switches have replaced hubs.
A bridge or switch is _____.
A bridge or switch is a device that connects and filters multiple network segments or devices, by forwarding data only to one or multiple devices that need to receive the data based on destination MAC address.
A router is _____.
A router is a device that forwards data packets between different computer networks based on network address (IP address).
A modem is _____.
A modem is a device used to connect network nodes via wire not originally designed for digital network traffic, by modulating the digital signal to produce an analog signal for transmission.
A firewall is _____.
A firewall is a device used to control network security and access rules by rejecting access requests from unrecognized sources while allowing actions from recognized ones.
An access point is _____.
An access point is a device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards.
An Internet Protocol address (IP address) is _____. An IP address serves two principal functions: _____ and _____.
An Internet Protocol address (IP address) is a numerical label assigned to each device participating in a network that uses the Internet Protocol for communication. An IP address serves two principal functions: host identification and network addressing.
IP addresses are _____-bit (IPv4) or _____-bit (IPv6) numbers usually written and displayed in human-readable notations, such as _____ (IPv4), and _____ (IPv6).
IP addresses are 32-bit (IPv4) or 128-bit (IPv6) numbers usually written and displayed in human-readable notations, such as 198.51.100.1 (IPv4), and 2001:db8:0:1234:0:567:8:1 (IPv6).
IP addresses are assigned to a host either _____, or _____.
IP addresses are assigned to a host either anew at the time of booting, or permanently by fixed configuration of its hardware or software. Persistent configuration is also known as using a static IP address. In contrast, in situations when the computer's IP address is assigned newly each time, this is known as using a dynamic IP address.
Static IP addresses are assigned _____.
Static IP addresses are assigned to a computer manually by an administrator.
Dynamic IP addresses are assigned _____.
Dynamic IP addresses are assigned either by the computer interface or host software itself through automatic configuration, or assigned by a server using Dynamic Host Configuration Protocol (DHCP).
A shared resource, or network share, is _____.
A shared resource, or network share, is a computer resource made available from one host to other hosts on a computer network.
In SOHO networks, a decentralized approach is often used, where _____. This approach is sometimes denoted as a _____ or _____ network.
In SOHO networks, a decentralized approach is often used, where every user may make their local folders and printers available to others. This approach is sometimes denoted as a workgroup or peer-to-peer network.
In a workgroup, each computer is responsible for _____.
In a workgroup, each computer is responsible for its own security, rather than relying on centralized authentication.
Windows 7 and later Microsoft operating systems extend the workgroup with _____.
Windows 7 and later Microsoft operating systems extend the workgroup with a homegroup option that uses a password to join computers into the group, and allows users' libraries, along with individual files and folders, to be shared between multiple computers.
In larger networks, a centralized file server or print server, sometimes denoted _____, is typically used. A _____ process on the local user computer takes the initiative to start the communication, while a _____ process on the file server or print server remote computer passively waits for requests to start a communication session.
In larger networks, a centralized file server or print server, sometimes denoted client–server network, is typically used. A client process on the local user computer takes the initiative to start the communication, while a server process on the file server or print server remote computer passively waits for requests to start a communication session.
The centralized authentication approach used in larger networks is referred to as a _____, where all _____ are registered with _____.
The centralized authentication approach used in larger networks is referred to as a domain, where all user accounts, computers, printers and other security principals, are registered with a central directory service.
The Internet is a global wide area network that connects computer systems across the world. It includes several high-bandwidth data lines that comprise the Internet "backbone."[1]
Objectives and skills for the Internet portion of CLEP Information Systems include:[2]
Web browsers (URLs, protocols, standards, history, cookies, resource allocation)
Internet and other online services and methods (World Wide Web, protocol, Web search engines, Web bots, intranet, cloud computing, communications, push/pull technology, W3C)
Web technologies (HTML, XML, Javascript)
Web site development (analysis, design, functionality, accessibility)
How is the Internet changing education and the learning institutions today? Describe how distance learning has changed how you learn.
Do you think the Internet needs controls or censorship? Support your answer.
Communication over the Internet has expanded and broadened everyone's lives. The Internet can have positive and negative affects as we spend time online. Is living in the digital world good or bad for people? Support your answer.
The internet also has the ability to "talk" to other computers. The internet is connected to the point where access to just about anything is derived from the internet. The internet is a globally connected network system that uses TCP/IP to transmit data via various types of media. The internet is a network of global exchanges – including private, public, business, academic and government networks – connected by guided, wireless and fiber-optic technologies.[3]
Web Browsers
Web browsers are used to deliver information resources, which are identified by a Uniform Resource Identifier (URL/URI). The user via a client/server model, can view and access information from the world wide web. [4]
A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web.[5]
All web browsers follow standards of HTML and XHTML to ensure information is easily shared and communicated. All web browsers utilize protocols, that allow information to be routed between the source host and the user host. [6][7]
Cookies and history are used to personalize the users experience on a web page. They are also used to track, retrieve, and present information regarding of past activities on a website. Cookies and history data can be used to modify the user's current activity on the same website. Cookies may be deleted using a browser's Settings or Preferences options.[8][9]
Internet Services
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide.[10]
The World Wide Web is an information system of interlinked hypertext documents and other digital resources that are accessed via the Internet.[11]
The Internet operates without a central governing body.[12]
A web search engine is a software system that is designed to search for information on the World Wide Web.[13]
A web bot is a computer program whose developers claim is able to predict future events by tracking keywords entered on the internet. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone.[14][15]
Web Site Development
Web development is a broad term for the work involved in developing a web site for the Internet (World Wide Web) or an intranet (a private network).[16]
Web development can range from developing the simplest static single page of plain text to the most complex web-based internet applications, electronic businesses, and social network services.[17]
Web development takes into account many security considerations, such as data entry error checking through forms, filtering output, and encryption.[18]
Many people use the terms Internet and World Wide Web, or just the Web, interchangeably, but the two terms are not synonymous.[19]
The World Wide Web is only one of hundreds of services used on the Internet. The Web is a global set of documents, images and other resources, logically interrelated by hyperlinks and referenced with Uniform Resource Identifiers(URIs).[20]
URIs symbolically identify services, servers, and other databases, and the documents and resources that they can provide. Hypertext Transfer Protocol (HTTP) is the main access protocol of the World Wide Web.[21]
Web services also use HTTP to allow software systems to communicate in order to share and exchange business logic and data.[22]
World Wide Web browser software, such as Microsoft's Internet Explorer, Mozilla Firefox, Opera, Apple's Safari, and Google Chrome, lets users navigate from one web page to another via hyperlinks embedded in the documents.[23]
Client-side software can include animations, games, office applications and scientific demonstrations.[24]
The Web has also enabled individuals and organizations to publish ideas and information to a potentially large audience online at greatly reduced expense and time delay. Publishing a web page, a blog, or building a website involves little initial cost and many cost-free services are available.[25]
Publishing and maintaining large, professional web sites with attractive, diverse and up-to-date information is still a difficult and expensive proposition. [26]
Many individuals and some companies and groups use web logs or blogs, which are largely used as easily updatable online diaries. Some commercial organizations encourage staff to communicate advice in their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information, and be attracted to the corporation as a result.[27]
The third generation of mobile telecommunications technology, based on a set of standards used for mobile devices and mobile telecommunications introduced in 1998.[28]
4G
The fourth generation of mobile telecommunications technology, based on a set of standards used for mobile devices and mobile telecommunications introduced in 2008.[29]
The fifth generation of mobile telecommunications technology, based on a set of standards used for mobile devices and mobile telecommunications introduced in 2017. [30]
Active Server Pages (ASP)
A common Microsoft server-side scripting language.[31]
application server
A software framework that provides both facilities to create web applications and a server environment to run them.[32]
Application Service Provider (ASP)
A business providing computer-based services to customers over a network using a standard protocol.[33]
blog
A discussion or informational site published on the World Wide Web and consisting of discrete entries typically displayed in reverse chronological order.[34]
Business-to-Business (B2B)
A situation where one business makes a commercial transaction with another.[35]
Business-to-Consumer (B2C)
A situation where a business makes a commercial transaction with a consumer.[36]
cable modem
A type of network bridge and modem that provides bi-directional data communication via radio frequency channels on a hybrid fibre-coaxial and RFoG infrastructure.[37]
cloud computing
A model for enabling ubiquitous, convenient, on-demand access to a shared pool of Internet-based configurable computing resources.[38]
communication protocol
A defined set of rules and regulations that determine how data is transmitted in telecommunications and computer networking.[39]
Consumer-to-Consumer (C2C)
A situation where a consumer makes a commercial transaction with another consumer.[40]
Content Management System (CMS)
A software development system that enables adding or updating text, images, and other Web site content without coding in HTML or using a Web authoring program.[41]
cookie
A small file deposited on a user’s hard disk by Web sites, enabling sites to remember what they know about their visitors between sessions.[42]
cyberspace
A term used to describe the Internet and other online networks, especially the artificial realities and virtual communities that form on them.[43]
dial-up
An early form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP) by dialing a telephone number on a conventional telephone line.[44]
digital divide
A term that describes the divide between the people who do and do not have access to the Internet.[45]
Domain Name System (DNS)
A system that translates a computer’s numerical IP address into an easier-to-remember string of names separated by dots.[46]
Digital Subscriber Line (DSL)
A family of technologies that are used to transmit digital data over telephone lines.[47]
dynamic IP address
An IP address that is assigned to a device when it connects to a network; when that device disconnects from the network, the IP address may be reused.[48]
e-commerce (electronic commerce)
Trading in products or services using computer networks, such as the Internet.[49]
email (electronic mail)
A method of exchanging digital messages from an author to one or more recipients.[50]
email server
A specialized server that acts like a local post office for a particular Internet host.[51]
extranet
A website that allows controlled access to partners, vendors and suppliers or an authorized set of customers.[52]
file server
In a LAN, a computer used as a storehouse for software and data that are shared by several users.[53]
file sharing
File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books.[54]
File Transfer Protocol (FTP)
A communications protocol that enables users to download files from remote servers to their computers and to upload files they want to share from their computers to these archives.[55]
filtering software
Software that, for the most part, keeps offensive and otherwise inappropriate Web content from being viewed by children, on-duty workers, and others.[56]
Global Position System (GPS)
A space-based navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more satellites.[57]
grid computing
The collection of computer resources from multiple locations to reach a common goal.[58]
hotspot
A physical location that offers Internet access over a wireless local area network (WLAN) through the use of a router connected to a link to an Internet service provider.[59]
Hypertext Markup Language (HTML)
A text file that includes codes that describe the format, layout, and logical structure of a hypermedia document.[60]
Hypertext Transfer Protocol (HTTP)
An application protocol for distributed, collaborative, hypermedia information systems used as the foundation of data communication for the World Wide Web.[61]
Hyper Text Transfer Protocol Secure (HTTPS)
is a communications protocol for secure communication over a computer network which is widely used on the Internet.[62]
hypertext
Text displayed on a computer display or other electronic devices with references or links to other text which the reader can immediately access, or where text can be revealed progressively at multiple levels of detail.[63]
I-commerce
Broad term covering all commercial activity on the internet, including auctioning, placing orders, making payments, transferring funds, and collaborating with trading partners. Internet commerce is not a synonym for electronic commerce (e-commerce) but one of its subsets.[64]
Internet
A global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide.[65]
Internet bot
Also known as web robot, WWW robot or simply -bot-, is a software application that runs automated tasks (scripts) over the Internet.[66]
Internet safety
The knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general.[67]
Internet Service Provider (ISP)
A business that provides its customers with connections to the Internet along with other services.[68]
internetworking
Connecting different types of networks and computer systems.[69]
intranet
A private website, accessible only to an organization’s staff. Gives employees the ability to communicate, collaborate, share documents and other information.[70]
Java
A platform-neutral, object-oriented programming language developed by Sun Microsystems for use on multiplatform networks.[71]
JavaScript
An interpreted scripting language that enables Web page designers to add scripts to HTML code.[72]
m-commerce (mobile commerce)
The delivery of electronic commerce capabilities directly into the consumer’s hand, anywhere, via wireless technology.[73]
malware
Malicious software used and spread on the Internet includes computer viruses which copy with the help of humans, computer worms which copy themselves automatically.[74]
Massively Multiplayer Online Role-Playing Games (MMORPG)
Web browser-based games, in which a very large number of players interact with one another within a world.[75]
net neutrality
The principle that Internet access should be free from restrictions related to the type of equipment being connected and the type of communication being performed with that equipment.[76]
open standards
A standard that is publicly available and has various rights to use associated with it.[77]
optical fiber
A flexible, transparent fiber made by drawing glass (silica) or plastic to a diameter slightly thicker than that of a human hair.[78]
packet-switching
A digital networking communications method that groups all transmitted data into suitably sized blocks which are transmitted via a medium that may be shared by multiple simultaneous communication sessions.[79]
platform
Whatever environment a piece of computer software or code object is designed to run within, obeying its constraints, and making use of its facilities.[80]
An IP address assigned semipermanently to a particular device connected to a network.[89]
social networking
A platform to build relationships among people who share similar interests, activities, backgrounds or real-life connections.[90]
streaming audio
Sound files that play without being completely downloaded to the local hard disk.[91]
streaming video
Video clip files that play while being downloaded.[92]
telecommuting
A work arrangement in which employees use technology to reduce or eliminate commuting time.[93]
Telnet
An application protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.[94]
Uniform Resource Identifier (URI)
A string of characters used to identify a resource [95]
A dedicated connection to a local area network via the internet.[97]
Voice over IP (VoIP)
A methodology and group of technologies for the delivery of voice communications and multimedia sessions over IP networks, such as the Internet.[98]
World Wide Web Consortium (W3C)
The main international standards organization for the World Wide Web.[99]
web authoring software
Programs that work like desktop publishing page layout programs to allow users to create, edit, and manage Web pages and sites without having to write HTML code.[100]
web bot
an internet bot computer program whose developers claim is able to predict future events by tracking keywords entered on the internet. [101]
web development
A broad term for the work involved in developing a web site for the Internet (World Wide Web) or an intranet (a private network).[102]
web portal
A Web site designed as a Web entry station, offering quick and easy access to a variety of services.[103]
web search engine
A web search engine is a software system that is designed to search for information on the World Wide Web.[104]
web server
A server that stores Web pages and sends them to client programs that request them.[105]
World Wide Web (WWW)
Part of the Internet, a collection of multimedia documents created by organizations and users worldwide linked by hypertext.[106]
Extensible Markup Language (XML)
A markup language that defines a set of rules for encoding documents in a format which is both human-readable and machine-readable.[107]
A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web.
Web browsers are _____.
Web browsers are used to deliver information resources, which are identified by a Uniform Resource Identifier (URL/URI), to the user via a client/server model, so that the user can view and access information from the world wide web.
All web browsers follow standards of _____.
All web browsers follow standards of HTML and XHTML to ensure information is easily shared and communicated and all web browsers utilize protocols, allowing information to be routed between the source host and the user host.
Cookies and history are used to _____.
Cookies and history are used to personalize the users experience on a web page and also used to track, retrieve, and present information regarding past activity on a website and use it to modify the user's current activity on the same website.
The Internet is _____.
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide.
The World Wide Web is _____.
The World Wide Web is an information system of interlinked hypertext documents and other digital resources that are accessed via the Internet.
The Internet operates _____.
The Internet operates without a central governing body.
A web search engine _____.
A web search engine is a software system that is designed to search for information on the World Wide Web.
A web bot is _____.
A web bot is a computer program whose developers claim is able to predict future events by tracking keywords entered on the internet. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone.
Web development is _____.
Web development is a broad term for the work involved in developing a web site for the Internet (World Wide Web) or an intranet (a private network).
Web development can range from _____.
Web development can range from developing the simplest static single page of plain text to the most complex web-based internet applications, electronic businesses, and social network services.
Web development takes into account _____.
Web development takes into account many security considerations, such as data entry error checking through forms, filtering output, and encryption.
Many people use the terms Internet and World Wide Web, or just the Web, interchangeably, but _____.
Many people use the terms Internet and World Wide Web, or just the Web, interchangeably, but the two terms are not synonymous.
The World Wide Web is only one of _____.
The World Wide Web is only one of hundreds of services used on the Internet. The Web is a global set of documents, images and other resources, logically interrelated by hyperlinks and referenced with Uniform Resource Identifiers(URIs).
URIs symbolically identify _____.
URIs symbolically identify services, servers, and other databases, and the documents and resources that they can provide. Hypertext Transfer Protocol (HTTP) is the main access protocol of the World Wide Web.
Web services also use HTTP to _____.
Web services also use HTTP to allow software systems to communicate in order to share and exchange business logic and data.
World Wide Web browser software, such as _____, lets users _____.
World Wide Web browser software, such as Microsoft's Internet Explorer, Mozilla Firefox, Opera, Apple's Safari, and Google Chrome, lets users navigate from one web page to another via hyperlinks embedded in the documents.
Client-side software can include _____.
Client-side software can include animations, games, office applications and scientific demonstrations.
The Web has also enabled individuals and organizations to publish _____.
The Web has also enabled individuals and organizations to publish ideas and information to a potentially large audience online at greatly reduced expense and time delay. Publishing a web page, a blog, or building a website involves little initial cost and many cost-free services are available.
Mac: Review Mac Security. Consider one of these options for best Mac security.
Research multi-factor authentication. Consider setting up multi-factor authentication on your Apple, Facebook, Google, and/or Microsoft accounts, as well as your password manager and your financial institutions.
Review Protecting Your Computer. Use anti-malware software to scan your system and test malware detection.
All: Set anti-malware,anti-virus software and operating system to automatically update.
All: Review Wikipedia: EICAR test file. Download and save the EICAR test file to test your anti-malware application and follow the process for removing malware.
Review Wikipedia: Wardriving. Use a free wireless scanner and scan your environment for wireless networks:
You are browsing the Internet at your favorite restaurant. How can you browse the Internet safely? Identify different threats and potential solutions associated with using unsecured Wi-Fi locations?
Identify various vulnerabilities that can affect you, your personal information. and your computer devices. Research, discuss and share information on how you can protect yourself against identify theft.
Security is an important concern while using email. Identify risks and list best practice solutions on how to safely use email.
Research top security software for common personal computer and mobile platforms. Include both proprietary and open source options. Install and test trial versions of one or more products. Which products would you recommend others use, and why?
Computer security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.[2] This includes controlling physical access to hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.[3] There are security tips you can follow to protect your computer and personal information. Tips, like updating your software, turning on two-factor authentication protection of passwords, back up your files and giving personal information over encrypted websites only, will keep Security threats like backdoors, denial-of-service attacks, direct-access attacks, eavesdropping, malware, spoofing, tampering, privilege escalation, phishing, and clickjacking.[4] at a distance.[5]
Network Backups is a system where the named data from a single computer/network of computers is dispatched and sent to a backup server.[6] The primary aim of backups is to recover data after its loss, be it by data deletion or corruption and the minor purpose is to recover data from an earlier time, according to a user-defined data retention policy.[7]
Data recovery is a process of retrieving inaccessible data from corrupted or damaged secondary storage, removable media or files, when the data they store cannot be accessed in a normal way.[8] Data recovery framework involves an operating system failure, break down and logical failure of storage devices and accidental damages.[9]
A disaster recovery plan (DRP) is a documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster.[10] It responds to unplanned incidents with precautions to minimize the effects of a disaster for an organization to continue with its operations.[11]
Internet safety is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general.[12] For your own safety from hackers, you need to keep your personal information professional and limited, keep your privacy settings on and practice safe browsing among other safe rules.[13]
Common threats to personal safety on the Internet include cyberstalking, cyberbullying, online predation, and obscene/offensive content.[14]. we need to take precautions whenever we are suspicious of these threats.
Malware, short for malicious software, is any software used to cause damage to a computer network, gather sensitive information, or gain access to private computer systems. It includes botnets, viruses, Trojan horses, spyware, scareware, ransomware, and worms.[15]. A game plan for protecting against malware is to stop harmful software from gaining access to the target computer.
Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Internet.[16] It is concerned with protecting user information. Privacy can entail either Personally-Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.[17]
Risks to Internet privacy include activity monitoring, content searches, and social network profiling. [18].You may, however, protect your privacy online by using built-in features of many social networks and browsers and third-party tools.[19]
Multi-factor authentication (MFA) is a method of computer access control which a user can pass by successfully presenting several separate authentication stages through credentials based on knowledge (something you know), possession (something you have), and inherence (something you are).[20]. in other words, it is a system that requires more than one method of authentication from a self-reliant listing of credentials to verify a user's identity for login.
A password manager is a software application that helps a user store and organizes passwords.[21]. It assists in initiating and retrieving complex passwords, possibly calculating them on request. Password managers require a user to remember and create one master password to unlock and access any information stored in their databases.
The function of specifying access rights to resources.[23]
backdoor
A backdoor in a computer system, a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls.[24]
backup
Copying and archiving of computer data so it may be used to restore the original after a data loss event.[25]
biometrics
Refers to measurements of human characteristics. [26]
BitLocker
A full disk encryption feature included with the Ultimate and Enterprise editions of Windows Vista and later Windows operating systems.[27]
bot
A software application that runs automated tasks over the Internet. [28]
botnet
A number of Internet-connected computers communicating with other similar machines in an effort to complete repetitive tasks and objectives.[29]
brute-force attack
A cryptanalytic attack that consists of systematically checking all possible keys or passwords until the correct one is found.[30]
computer forensics
A branch of digital forensic science pertaining to the recovery and investigation of material found in computers and digital storage media, often related to computer crime. [31]
computer security
The protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.[32]
cyber crime
Any crime that involves a computer and a network.[33]
cryptography
the practice and study of techniques for secure communication in the presence of third parties called adversaries.[34]
denial-of-service attack
An attempt to make a machine or network resource unavailable to its intended users.[35]
device hardening
The process of securing a system by reducing its surface of vulnerability through the removal of unnecessary software, unnecessary usernames or logins and the disabling or removal of unnecessary services.[36]
dictionary attack
A technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities from a list.[37]
disaster recovery plan
A documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster.[38]
dumpster diving
The practice of sifting through commercial or residential waste to find items that have been discarded by their owners, but that may prove useful to the collector.[39]
eavesdropping
The act of surreptitiously listening to a private conversation, typically between hosts on a network.[40]
encryption
The process of encoding messages or information in such a way that only authorized parties can read it.[41]
ethical hacker
A computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.[42]
filter
On the Internet, a filter is a program to screen and exclude from access or availability Web pages or e-mail that is deemed inappropriate.[43]
firewall
A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.[44]
hacking
Seek and exploit weaknesses in a computer system or computer network.[45]
HTTPS
A communications protocol for secure communication over a computer network which is widely used on the Internet.[46]
identity theft
The deliberate use of someone else's personal information, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name.[47]
internet security
A catch-all term for a very broad issue covering security for transactions made over the Internet. Generally, Internet security encompasses browser security, the security of data entered through a Web form, and overall authentication and protection of data sent via Internet Protocol.[48]
iptables
A Linux kernel software firewall that allows system administrators to configure rules and chains.[49]
keystroke logging
The action of recording the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.[50]
malware
Any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.[51]
multi-factor authentication
A method of computer access control which a user can pass by successfully presenting authentication factors from at least two of the three categories of knowledge, possession, and inherence.[52]
packet sniffer
A computer program that can intercept and log traffic passing over a digital network.[53]
password complexity
The length and character set combinations used to create a password, such as upper case and lower case letters, numbers, and punctuation.[54]
password confidentiality
A set of rules or a promise that limits access or places restrictions on password sharing.[55]
password cracking
The process of recovering passwords from data that have been stored in or transmitted by a computer system, most often through brute-force or dictionary attacks.[56]
password expiration
A policy that requires users to change passwords periodically.[57]
password reuse
A policy that prevents users from repeating recently used passwords.[58]
permissions
Access rights assigned to specific users and groups of users to control the ability of the users to view or make changes to system objects.[59]
penetration test
A targeted and simulated attack on a system to identify potential security vulnerabilities.[60]
phishing
The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.[61]
physical security
Measures designed to deny unauthorized access to facilities, equipment and resources, and to protect personnel and property from damage or harm.[62]
ransomware
A type of malware which restricts access to the computer system that it infects, and demands a fee be paid to the operators of the malware in order for the restriction to be removed.[63]
rootkit
A stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer.[64]
security patch
A change applied to an asset to correct the weakness described by a vulnerability.[65]
shoulder surfing
Using direct observation techniques to obtain information such as passwords, PINs, security codes, and similar data.[66]
single sign-on
A property of access control systems that allows a user to log in once and gain access to all interrelated systems without being prompted to log in again.[67]
social engineering
Psychological manipulation of people to cause them to perform actions or divulge confidential information.[68]
spam
Unsolicited electronic messages, especially advertising.[69]
spoofing
Concealing the identity of the sender by impersonating another computing system.[70]
spyware
Software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.[71]
system administrator
A person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers.[72]
Trojan
A non-self-replicating type of malware program containing malicious code that, when executed typically causes loss or theft of data, and possible system harm.[73]
virus
A malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or firmware.[74]
worm
A standalone malware computer program that replicates itself in order to spread to other computers.[75]
WPA / WPA2 (Wi-Fi Protected Access)
Security protocol used secure wireless computer networks.[76]
zombie computer
A computer connected to the Internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious tasks of one sort or another under remote direction.[77]
Computer security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
Computer security includes _____.
Computer security includes controlling physical access to hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.
Security threats include _____.
Security threats include backdoors, denial-of-service attacks, direct-access attacks, eavesdropping, malware, spoofing, tampering, privilege escalation, phishing, and clickjacking.
Internet safety is _____.
Internet safety is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general.
Network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules is called ________.
Network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules is called Firewall.
Process of encoding messages or information in a way that only authorized parties can read it is called ________.
Process of encoding messages or information in a way that only authorized parties can read it is called Encryption.
Common threats to personal safety on the Internet include _____.
Common threats to personal safety on the Internet include cyberstalking, cyberbullying, online predation, and obscene/offensive content.
Malware, short for malicious software, is _____. It includes _____.
Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
Malware, includes _____.
Malware includes botnets, viruses, Trojan horses, spyware, scareware, ransomware, and worms.
Internet privacy involves _____.
Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Internet.
Privacy can entail either _____.
Privacy can entail either Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.
Risks to Internet privacy include _____.
Risks to Internet privacy include activity monitoring, content searches, and social network profiling.
Multi-factor authentication (MFA) is _____.
Multi-factor authentication (MFA) is a method of computer access control which a user can pass by successfully presenting several separate authentication stages through credentials based on knowledge (something you know), possession (something you have), and inherence (something you are).
A password manager is _____.
A password manager is a software application that helps a user store and organize passwords.
A non-self-replicating type of malware program which typically causes loss or theft of data, and possible system harm is called ______.
A non-self-replicating type of malware program which typically causes loss or theft of data, and possible system harm is called Trojan.
An information system (IS) is an organized system for the collection, organization, storage and communication of information.
More specifically, it is the study of complementary networks that people and organizations use to collect, filter, process, create and distribute data.[1]
Review Wikipedia: Information system. Create a list of information systems you encounter every day. What systems and devices do you use that capture and interpret information? This may include computers, automobiles, shopping at stores, Internet purchases, Internet surfing, business systems, accounting systems, healthcare systems, etc.
Review Wikipedia: Privacy. Consider the information that various vendors and providers track about you. What information do they have? How is your information used and who do they share it with? Select a vendor or provider and read their privacy policy to find out.
Review Wikipedia: Enterprise resource planning. Research ERP systems. Who are the top three or top five vendors? Find out what these systems cost and consider why a company would make an investment in this type of system. Provide examples.
Review Wikipedia: Supply chain management. Think about a recent manufactured food or beverage product purchase you made at a store. Now consider the full supply chain involved in making that item available for you to purchase. What inventory control systems are likely in place at the store, the distributor, and the manufacturer? What manufacturing processes and ingredients were necessary, and what information systems would have been required to support manufacturing and delivering this product to you?
Review Wikipedia: Watson (computer). IBM's Watson computer system is now being used to improve health care. How does Watson use knowledge management concepts to improve healthcare, and what types of benefits are being seen? Provide examples.
Review Wikipedia: Geographic Information System. Consider goods or services needed in your area(park, hospital etc.). Now, determine where the providers of these services should be placed.
Employment in computer and information technology occupations are expected to increase within the next ten years. With these different types of advancements in information systems, what types of potential skills do you feel will be necessary for students to need to be successful?
Most information systems include the discussion of hardware, software, data, people, and procedures. What is the importance of including people? What are some skills and concepts that are critical for people in information technology to be successful? Discuss.
With our current use of technology and information system resources, do you feel that you receive enough information or not enough information to make appropriate decisions (personally or professionally)? Discuss.
Many individuals may agree that the use of robots has benefits for our society. What do you think would be some potential positive and negative implications?
From the above readings, select an information system and explain how that information system relates to you. Support your answer with potential advantages and disadvantages.
An information system is any organized system for the collection, organization, storage and communication of information.[3]
Information systems aim to support operations, management, and decision making through inter-relation between data systems and activity systems.[4]
Information systems are a combination of hardware, software, data, procedures, people, and feedback.[5]
Expert systems are computer systems that emulate the decision-making ability of a human expert.[6]
An expert system is divided into two sub-systems: the knowledge base and the inference engine. The knowledge base represents facts and rules. The inference engine applies the rules to the known facts to deduce new facts.[7]
Electronic data interchange (EDI) is an electronic communication method that provides standards for exchanging data via any electronic means. By adhering to the same standard, two different companies or organizations, even in two different countries, can electronically exchange documents (such as purchase orders, invoices, shipping notices, and many others).[8]
EDI and other similar technologies save a company money by providing an alternative to, or replacing, information flows that require a great deal of human interaction and paper documents.[9]
Barriers to implementing EDI systems include necessary business process changes and cost in time and money for initial set-up.[10]
Enterprise resource planning (ERP) is business management software that an organization can use to collect, store, manage and interpret data from a variety of business activities.[11]
ERP systems may include product planning, manufacturing or service delivery, marketing and sales, inventory management, shipping, and payment.[12]
Knowledge management (KM) is the process of capturing, developing, sharing, and effectively using organizational knowledge.[13]
Knowledge management efforts typically focus on organizational objectives such as improved performance, competitive advantage, innovation, the sharing of lessons learned, integration and continuous improvement of the organization.[14]
GIS is a system designed to capture, store, manipulate, analyze, manage, and present spatial or geographic data.[15]
Box consisting of a radio receiver/transmitter and antennae that link to a wired network, router, or hub.[16]
acceptance testing
Provides the final certification that the system is ready to be used in a production setting.[17]
artificial intelligence (AI)
artificial intelligence diagramis intelligence demonstrated by machines, in contrast to the natural intelligence (NI) displayed by humans and other animals. In computer science AI research is defined as the study of "intelligent agents": any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals.[18]
batch processing
The execution of a series of programs on a computer without manual intervention.[19]
business intelligence (BI)
A set of techniques and tools for the acquisition and transformation of raw data into meaningful and useful information for business analysis purposes.[20]
business strategy
The formulation and implementation of the major goals and initiatives taken by a company's top management on behalf of owners, based on consideration of resources and an assessment of the internal and external environments in which the organization competes.[21]
cost-benefit analysis (CBA)
A systematic approach to estimating the strengths and weaknesses of alternatives that satisfy transactions, activities or functional requirements for a business.[22]
critical path method (CPM)
An algorithm for scheduling a set of project activities based on the time (duration) that each activity will take to complete, the dependencies between the activities, and logical end points such as milestones or deliverable items.[23]
critical success factor (CSF)
An element that is necessary for an organization or project to achieve its mission.[24]
customer relationship management (CRM)
An approach to managing a company’s interactions with current and future customers that often involves using technology to organize, automate, and synchronize sales, marketing, customer service, and technical support.[25]
data mining
Analysis of large pools of data to find patterns and rules that can be used to guide decision making and predict future behavior.[26]
data administration
A special organizational function for managing the organization's data resources, concerned with information policy, data planning, maintenance of data dictionaries, and data quality standards.[27]
database management system (DBMS)
A computer software application that interacts with the user, other applications, and the database itself to capture and analyze data.[28]
decision support system (DSS)
A computer-based information system that supports business or organizational decision-making activities.[29]
E-commerce (electronic commerce)
Trading in products or services using computer networks, such as the Internet.[30]
eLearning
eLearning technology enables organizations to create customized training and education software. This can include lesson plans, monitoring progress against learning goals, online classes, etc. eLearning technology enables organizations to significantly reduce the cost of training and educating their members.[31]
electronic data interchange (EDI)
An electronic communication method that provides standards for exchanging data via any electronic means.[32]
enterprise portal
Web site that aggregates information across the entire organization or for groups within the organization such as project teams.[33]
enterprise resource planning (ERP)
Business management software that a company can use to collect, store, manage and interpret data from many business activities.[34]
executive information system (EIS)
A type of management information system that facilitates and supports senior executive information and decision-making needs.[35]
expert system
A computer system that emulates the decision-making ability of a human expert. [36]
GIGO (garbage in, garbage out)
Describes how computers may unquestioningly process unintended, even nonsensical, input data and produce undesired, often nonsensical, output.[37]
geographic information system (GIS)
A system designed to capture, store, manipulate, analyze, manage, and present all types of spatial or geographical data.[38]
groupware
Technologies that facilitate collaboration and sharing of organizational information. One of the earliest very successful products in this category was Lotus Notes. Notes provided tools for threaded discussions, sharing of documents, organization wide uniform email, etc.[39]
information system
A system composed of people and computers that processes or interprets information.[40]
The process of capturing, developing, sharing, and effectively using organizational knowledge, It refers to a multi-disciplinary approach to achieving organizational objectives by making the best use of knowledge.[42]
learning management system (LMS)
Is a software application for the administration, documentation, tracking, reporting and delivery of educational courses or training programs.[43]
management information system (MIS)
The management of information systems to provide efficiency and effectiveness of strategic decision making. [44]
robot
RobotA robot is a machine—especially one programmable by a computer— capable of carrying out a complex series of actions automatically.[2] Robots can be guided by an external control device or the control may be embedded within. Robots may be constructed to take on human form but most robots are machines designed to perform a task with no regard to how they look.[45]
scheduling and planning tools
Automate the creation and maintenance of an organization's schedule: scheduling meetings,notifying people of a meeting, etc. An example of a well known scheduling tool is Microsoft Outlook. The planning aspect can integrate with project management tools such as Microsoft Project. Some of the earliest successful uses of KM technology in the business world were the development of the following types of tools: online versions of corporate "yellow pages" with listing of contact info, relevant knowledge, and work history.[46]
strategic planning
An organization's process of defining its strategy, or direction, and making decisions on allocating its resources to pursue this strategy.[47]
supply chain management (SCM)
The oversight of materials, information, and finances as they move in a process from supplier to manufacturer to wholesaler to retailer to consumer. .[48]
telepresence
Telepresence technology enables individuals to have virtual meetings rather than having to be in the same place. Videoconferencing is the most obvious example.[49]
Total Quality Management (TQM)
Consists of organization-wide efforts to install and make permanent a climate in which an organization continuously improves its ability to deliver high-quality products and services to customers.[50]
software prototyping
The activity of creating prototypes of software applications, i.e., incomplete versions of the software program being developed.[51]
transaction processing system (TPS)
A software system, or software/hardware combination, that processes data by dividing the processes into individual, indivisible operations.[52]
value added network (VAN)
A hosted service offering that acts as an intermediary between business partners sharing standards based on proprietary data via shared business processes. [53]
value chain
A set of activities that a firm operating in a specific industry performs in order to deliver a valuable product or service for the market.[54]
Web 2.0
refers to World Wide Web websites that emphasize user-generated content, usability (ease of use, even by non-experts), and interoperability (this means that a website can work well with other products, systems, and devices) for end users.[55]
workflow tools
Allow the representation of processes associated with the creation, use, and maintenance of organizational knowledge. For example the process to create and utilize forms and documents within an organization. For example, a workflow system can do things such as send notifications to appropriate supervisors when a new document has been produced and is awaiting their approval.[56]
workflow management system (WMS)
Provides an infrastructure for the set-up, performance and monitoring of a defined sequence of tasks, arranged as a workflow.[57]
An information system is any organized system for the collection, organization, storage and communication of information.
Information systems aim to _____.
Information systems aim to support operations, management and decision making through inter-relation between data systems and activity systems.
Information systems are a combination of _____, _____, _____, _____, _____, and _____.
Information systems are a combination of hardware, software, data, procedures, people, and feedback.
Expert systems are _____.
Expert systems are computer systems that emulate the decision-making ability of a human expert.
An expert system is divided into two sub-systems: _____ and _____. _____ represents facts and rules. _____ applies the rules to the known facts to deduce new facts.
An expert system is divided into two sub-systems: the knowledge base and the inference engine. The knowledge base represents facts and rules. The inference engine applies the rules to the known facts to deduce new facts.
Electronic data interchange (EDI) is _____.
Electronic data interchange (EDI) is an electronic communication method that provides standards for exchanging data via any electronic means. By adhering to the same standard, two different companies or organizations, even in two different countries, can electronically exchange documents (such as purchase orders, invoices, shipping notices, and many others).
EDI and other similar technologies save a company money by _____.
EDI and other similar technologies save a company money by providing an alternative to, or replacing, information flows that require a great deal of human interaction and paper documents.
Barriers to implementing EDI systems include _____.
Barriers to implementing EDI systems include necessary business process changes and cost in time and money for initial set-up.
Enterprise resource planning (ERP) is _____.
Enterprise resource planning (ERP) is business-management software that an organization can use to collect, store, manage and interpret data from a variety of business activities.
ERP systems may include processes such as _____.
ERP systems may include processes product planning, manufacturing or service delivery, marketing and sales, inventory management, shipping, and payment.
Knowledge management (KM) is _____.
Knowledge management (KM) is the process of capturing, developing, sharing, and effectively using organizational knowledge.
Knowledge management efforts typically focus on organizational objectives such as _____.
Knowledge management efforts typically focus on organizational objectives such as improved performance, competitive advantage, innovation, the sharing of lessons learned, integration and continuous improvement of the organization.
Systems development is a process used in systems engineering, information systems, and software engineering for planning, creating, testing, and deploying an information system.[1]
Objectives and skills for the systems development portion of CLEP Information Systems include:[2]
Software development (prototyping, SDLC, RAD, CASE, JAD, Agile)
Systems development (feasibility, process, systems analysis, systems design, end-user development, project management)
System implementation (testing, training, data conversion, system conversion, system maintenance, post-implementation activities, post-implementation review, documentation)
Information processing methods (batch, real-time, transaction)
User interface design (GUI, multimedia)
Standards (development, purpose, proprietary, open source)
Review Wikipedia: Processing modes and the different types of computer processing. Consider your bank or credit card account. Is your current balance immediately available, suggesting real-time processing, or is it updated daily, suggesting batch processing?
Read the article ConceptDraw: Graphic User Interface. Then identify different features of a GUI, including windows, title bars, buttons, menus, icons, content areas, scroll bars, status bars, etc.
Review Wikipedia: Diagramming software. Select a diagramming program and create a diagram, flowchart, or mind map for systems development.
A company you are working for is implementing a new system at your work location. Select a phase in the system development life cycle that interests you. Discuss the activities that may occur during this step of the SDLC and include how it has impacted you at your place of work.
What are the benefits derived from using a systems development methodology? Support your answer.
Describe the purpose of systems analysis and design when developing information systems and how it can apply to you. What are potential advantages and disadvantages to systems analysis?
What do you do first when implementing a new system? Explain your experience. Does it support the SDLC?
Compare and contrast SDLC and Agile development? What are the pros and cons of each development?
Software development is the process of computer programming, documenting, testing, and bug fixing involved in creating and maintaining applications and frameworks involved in a software release life cycle and resulting in a software product.[3]
Software prototyping is the activity of creating prototypes of software applications, i.e., incomplete versions of the software program being developed.[4]
The systems development life cycle (SDLC), also referred to as the application development life cycle, is a term used in systems engineering, information systems, and software engineering to describe a process for planning, creating, testing, deploying and maintaining an information system.[5]
Rapid application development (RAD) is an alternative to the conventional waterfall model of software development which puts less emphasis on planning tasks and more emphasis on development through the use of prototypes addition to or even sometimes in place of design specifications.[6]
Computer-aided software engineering (CASE) is the domain of software tools used to design and implement software that is high-quality, defect-free, and maintainable.[7]
Joint application design (JAD) is a process used to collect business requirements while developing new information systems for a company which includes approaches for enhancing user participation, expediting development, and improving the quality of specifications.[8]
Agile software development is a group of software development methods in which requirements and solutions evolve through collaboration between self-organizing, cross-functional teams. It promotes adaptive planning, evolutionary development, early delivery, continuous improvement, and encourages rapid and flexible response to change.[9]
The Waterfall model is a breakdown of sequential project activities. Each phase depends on the completion of the prior step and corresponds to a specialization of tasks. this model does not allow for much flexibility and can be time consuming since you can't progress until the previous step is complete.
System Development
Before any system planning is done, a feasibility study should be conducted to determine if creating a new or improved system is a viable solution. This will help to determine the costs, benefits, resource requirements, and specific user needs to be required for completion.[10]
The goal of system analysis is to determine where the problem is, in an attempt to fix the system. This step involves breaking down the system in different pieces to analyze the situation, analyzing project goals, breaking down what needs to be created and attempting to engage users so that definite requirements can be defined.[11]
In systems design, the design functions and operations are described in detail, including screen layouts, business rules, process diagrams and other documentation. The design stage takes as its initial input the requirements identified in the approved requirements document. For each requirement, a set of one or more design elements will be produced as a result of interviews, workshops, and/or prototype efforts. Design elements describe the desired system features in detail and generally include functional hierarchy diagrams, screen layout diagrams, tables of business rules, business process diagrams, pseudo-code, and a complete entity-relationship diagram with a full data dictionary. These design elements are intended to describe the system in sufficient detail, such that skilled developers and engineers may develop and deliver the system with minimal additional input design.[12]
Project management is the discipline of carefully projecting or planning, organizing, motivating and controlling resources to achieve specific goals and meet specific success criteria. Project management processes include initiating, planning, executing, monitoring and controlling, and closing.[13]
System Implementation
New systems are tested in a variety of ways and at various levels to provide information on the functionality and performance of the product or service that is to be utilized. [14][15]
After the system is tested, operational and production training is provided to users who will be maintaining the system and those using the system for production.[16]
Data conversion and system conversion translates data and systems from one format to another, which can be completed in increments or all at once, allows users to access and process information and data all under the implemented system.[17]
After a system is fully implemented, system maintenance and post-implementation activity are required for upkeep and enhancements, post-implementation review to analyze and evaluate the system's performance and assess any potential changes and enhancements to improve functionality.[18][19]
Documentation is taken throughout the whole implementation process-- pre-implementation, during implementation, and post-implementation-- to record, measure, and audit the system's effectiveness and functionality.[20]
Information Processing
Transaction processing is a style of computing that divides work into individual, indivisible operations, called transactions.[21]
Batch processing is the execution of a series of programs (jobs) on a computer without manual intervention. Several transactions, called a batch are collected and processed at the same time. The results of each transaction are not immediately available when the transaction is being entered; there is a time delay.[22]
Real-time systems attempt to guarantee an appropriate response to a stimulus or request quickly enough to affect the conditions that caused the stimulus. Each transaction in real-time processing is unique; it is not part of a group of transactions.[23]
Graphical user interface
The goal of user interface design is to make the user's interaction as simple and efficient as possible. [24]
A group of software development methods in which requirements and solutions evolve through collaboration between self-organizing, cross-functional teams which promotes adaptive planning, evolutionary development, early delivery, continuous improvement, and encourages rapid and flexible response to change. [25]
alpha testing
Simulated or actual operational testing by potential users/customers or an independent test team at the developers' site.[26]
batch processing
Batch processing is the execution of a series of programs (jobs) on a computer without manual intervention. Several transactions, called a batch are collected and processed at the same time. The results of each transaction are not immediately available when the transaction is being entered;[1] there is a time delay.[27]
beta testing
Comes after alpha testing and can be considered a form of external user acceptance testing.[28]
compiler
A language translator that converts an entire program into machine language before executing it.[29]
computer aided design (CAD)
The use of computer systems to assist in the creation, modification, analysis, or optimization of a design.[30]
computer-aided software engineering (CASE)
The domain of software tools used to design and implement software applications.[31]
data dictionary
A centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format. [32]
data flow diagram
A graphical representation of the "flow" of data through an information system, modeling its process aspects.[33]
decision table
A precise yet compact way to model complex rule sets and their corresponding actions which associates conditions with actions to perform.[34]
end-user development
Activities and tools that allow end-users – people who are not professional software developers – to program computers.[35]
Feasibility Study
Flowchartan assessment of the practicality of a proposed project or system which helps to determine the costs, benefits, resource requirements, and specific user needs required for completion.[36]
flowchart
A program design tool that graphically shows step-by-step the actions a computer program will take.[37]
graphical user interface (GUI)
is a type of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, instead of text-based user interfaces, typed command labels or text navigation.[38]
implementation phase
The SDLC phase that includes testing, training, equipment replacement, and file conversion.[39]
information architecture
Development of the process and/or information flow of the system.[40]
integrated development environment (IDE)
An IDE is a software development application that consists of tools for debugging, source code editing, and automation.[41]
investigation phase
The SDLC phase where existing business problems and/or opportunities are studied.[42]
joint application design (JAD)
A process used to collect business requirements while developing new information systems for a company which includes approaches for enhancing user participation, expediting development, and improving the quality of specifications.[43]
maintenance phase
The system is assessed to ensure it does not become obsolete and changes are made to initial software.[44]
parallel systems
A process used in testing systems where the old system and the new system are operated simultaneously to verify the new system is working properly.[45]
program design
The phase of the program development life cycle in which the program specifications are expanded into a complete design of the new program.[46]
program coding
The phase of the program development life cycle in which the program code is written using a programming language.[47]
project management
The process and activity of planning, organizing, motivating, and controlling resources, procedures and protocols to achieve specific goals in scientific or daily problems.[48]
rapid application development (RAD)
A design approach that emphasizes the necessity of adjusting requirements in reaction to knowledge gained as the project progresses, and based on the use of prototypes in addition to or even sometimes in place of design specifications.[49]
real time processing
Attempt to guarantee an appropriate response to a stimulus or request quickly enough to affect the conditions that caused the stimulus.[50]
scrum (Software Development)
Scrum is a software development framework that is designed to work with small teams focusing on two weeks development cycles called "sprints".[51]
A process used by systems engineers and systems developers to plan for, design, build, test, deliver and maintain information systems.[53]
stepwise refinement
A process used to break problems down into smaller problems.[54]
software maintenance
After the deployment of a new interface, occasional maintenance may be required to fix software bugs, change features, or completely upgrade the system.[55]
software prototyping
The activity of creating incomplete test versions of a software program being developed. [56]
systems design
The process of defining the architecture, components, modules, interfaces, and data for a system to satisfy specified requirements.[57]
unified modeling language (UML)
A set of standard notations for creating business models; widely used for modeling object-oriented programs.[58]
usability inspection
A set of methods where a tester evaluates a user interface.[59]
user interface design (UI)
is the design of user interface for machine and software, such as computer, home appliances, mobile devices and other electronic devices, with the focus on maximizing usability and the user experience. Wikipedia: User interface design [60]
transaction processing (TPS)
A Transaction Processing System (TPS) is a type of information system that collects, stores, modifies and retrieves the data transactions of an enterprise. Transaction processing systems also attempt to provide predictable response times to requests, although this is not as critical as for real-time systems. Rather than allowing the user to run arbitrary programs as time-sharing, transaction processing allows only predefined, structured transactions. Each transaction is usually short duration and the processing activity for each transaction is programmed in advance.[61]
The activity of creating prototypes of software applications, i.e., incomplete versions of the software program being developed is ____________.
Software prototyping
What is the term used in systems engineering, information systems, and software engineering to describe a process for planning, creating, testing, deploying and maintaining an information system?
The systems development life cycle (SDLC), also referred to as the application development life cycle.
An alternative to the conventional waterfall model of software development which puts less emphasis on planning tasks and more emphasis on development through the use of prototypes addition to or even sometimes in place of design specifications is ___________.
Rapid application development (RAD)
What is the domain of software tools used to design and implement software that is high-quality, defect-free, and maintainable?
Computer-aided software engineering (CASE)
What is the process used to collect business requirements while developing new information systems for a company which includes approaches for enhancing user participation, expediting development, and improving the quality of specifications?
Joint application design (JAD)
A group of software development methods in which requirements and solutions evolve through collaboration between self-organizing and cross-functional teams is called _______________. It promotes adaptive planning, evolutionary development, early delivery, continuous improvement, and encourages rapid and flexible response to change.
Agile software development
What should be conducted to determine if creating a new or improved system is a viable solution? This will help to determine the costs, benefits, resource requirements, and specific user needs required for completion.
A feasibility study
The goal of system analysis is _____.
The goal of system analysis is to determine where the problem is, in an attempt to fix the system. This step involves breaking down the system in different pieces to analyze the situation, analyzing project goals, breaking down what needs to be created and attempting to engage users so that definite requirements can be defined.
In systems design, _____.
In systems design, the design functions and operations are described in detail, including screen layouts, business rules, process diagrams and other documentation. The design stage takes as its initial input the requirements identified in the approved requirements document. For each requirement, a set of one or more design elements will be produced as a result of interviews, workshops, and/or prototype efforts. Design elements describe the desired system features in detail and generally include functional hierarchy diagrams, screen layout diagrams, tables of business rules, business process diagrams, pseudo-code, and a complete entity-relationship diagram with a full data dictionary. These design elements are intended to describe the system in sufficient detail, such that skilled developers and engineers may develop and deliver the system with minimal additional input design.
What is the discipline of carefully projecting or planning, organizing, motivating and controlling resources to achieve specific goals and meet specific success criteria which contain the following processes: initiating, planning, executing, monitoring and controlling, and closing?
Project management
New systems are tested _____.
New systems are tested in a variety of ways and at various levels to provide information on the functionality and performance of the product or service that is to be utilized.
After the system is tested, _____ is provided to users who will be maintaining the system and those using the system for production.
After the system is tested, operational and production training is provided to users who will be maintaining the system and those using the system for production.
Data conversion and system conversion _____.
Data conversion and system conversion translates data and systems from one format to another, which can be completed in increments or all at once, allows users to access and process information and data all under the implemented system.
After a system is fully implemented, system maintenance and post-implementation activity are required for _____.
Upkeep and enhancements, post-implementation review to analyze and evaluate the system's performance and assess any potential changes and enhancements to improve functionality.
What is created throughout the whole implementation process-- pre-implementation, during implementation, and post-implementation-- to record, measure, and audit the system's effectiveness and functionality?
Documentation
The style of computing that divides work into individual, indivisible operations, is called ________________.
Transaction processing
An execution of a series of programs (jobs) on a computer without manual intervention. Several transactions are collected and processed at the same time. The results of each transaction are not immediately available when the transaction is being entered; there is a time delay. This is known as ___________________.
Batch processing
What type of systems attempt to guarantee an appropriate response to a stimulus or request quickly enough to affect the conditions that caused the stimulus. Each transaction is unique and it is not part of a group of transactions.
Real time systems
The goal of _________________________ is to make the user's interaction as simple and efficient as possible.
Programming is the craft of writing useful, maintainable, and extensible source code which can be interpreted or compiled by a computing system to perform a meaningful task.[1]
Learn programming concepts by playing a computer game at Code.org.
Review the TIOBE: Software Index. Identify currently popular programming languages. If your organization does software development, find out what programming languages are used and where they fall on the software index. Otherwise, check programming classes available at your school and find out what languages are taught and where they fall on the software index.
Complete one or more of the drag-and-drop programming tutorials at Code.org: Learn.
Complete the dungeon levels of the first lesson of CodeCombat.
When people and computers are creating a program, users generally blame the computer. Do you think it is more likely that a computer or a person would be responsible for a serious system problem? Support your answer.
New programming languages are developed to meet different user needs. Identify and research one new programming language that interests you. Determine the purpose of the program and what it is used for. Is this a program that would be useful for you? Why or why not.
Describe a computer program that you use at your workplace. Does this program enhance and support your job experience? Explain.
Computer programming is a process that leads from an original formulation of a computing problem to executable computer programs.[3]
Programming involves activities such as analysis, developing understanding, generating algorithms, verification of requirements of algorithms, and implementation (commonly referred to as coding) of algorithms in a target programming language.[4]
Source code is written in one or more programming languages.[5] Popular programming languages include Java, C, C++, C#, and Python.[6]
Reliability: how often the results of a program are correct.
Robustness: how well a program anticipates problems due to errors (not bugs).
Usability: the ease with which a person can use the program for its intended purpose.
Portability: the range of computer hardware and operating system platforms on which the source code of a program can be compiled/interpreted and run.
Maintainability: the ease with which a program can be modified by its present or future developers in order to make improvements.
Efficiency: the amount of system resources a program consumes.
Most programming languages follow the order of operations commonly used in mathematics of Parentheses, Exponents, Multiplication, Division, Addition, and Subtraction, or PEMDAS.[8]
Object-oriented programming (OOP) is a programming paradigm based on the concept of "objects", which are data structures that contain data, in the form of fields, often known as attributes; and code, in the form of procedures, often known as methods.[9]
Most popular object-oriented programming languages are class-based, meaning that objects are instances of classes, which typically also determines their type.[10]
Popular object-oriented programming languages include Java, C++, C#, and Python.[11]
Structured programming is a programming paradigm aimed at improving the clarity, quality, and development time of a computer program by making extensive use of subroutines, block structures and for and while loops—in contrast to using simple tests and jumps such as the goto statement which could lead to "spaghetti code", which is difficult both to follow and to maintain. [12]
Structured programming uses three control structures — sequencing, selection (conditions), and iteration (loops) — to define any program or function.[13]
Structured query language (SQL) is a domain-specific language used in programming and designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS).[14]
A data type is a classification identifying one of various types of data, such as integer, floating-point number, Boolean, character, or string, that determines the possible values for that type; the operations that can be done on values of that type; the meaning of the data; and the way values of that type are stored.[15]
At the machine level, data types correspond to the sizes of system memory locations and processor data containers (registers) and supporting instructions.[16]
A computer file is a resource for storing information, which is available to a computer program and is usually based on some kind of durable storage.[17]
acceptance testing (beta testing/application testing/end user testing)
A test conducted to determine if the requirements of a specification or contract are met.[18]
advanced business application programming (ABAP)
A high-level programming language created by the German software company SAP SE.[19]
algorithm
A self-contained step-by-step set of operations to be performed.[20]
applet
Any small application that performs one specific task that runs within the scope of a dedicated widget engine or a larger program, often as a plug-in. The term is frequently used to refer to a Java applet, a program written in the Java programming language that is designed to be placed on a web page.[21]
A data type having two values (usually denoted true and false), intended to represent the truth values of logic and Boolean algebra.[23]
bug
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.[24]
C
A general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations.[25]
C++
A general-purpose programming language that has imperative, object-oriented and generic programming features, while also providing facilities for low-level memory manipulation.[26]
compiler
A program that reads source code, translates it into machine language, and writes the machine language to binary (object) code that can be directly loaded and executed.[27]
computer architecture
A set of rules and methods that describe the functionality, organization, and implementation of computer systems.[28]
computer file
a resource for storing information, which is available to a computer program and is usually based on some kind of durable storage.[29]
computer programming
A process that leads from an original formulation of a computing problem to executable computer programs.[30]
control structure
The order in which individual statements, instructions or function calls of an imperative program are executed or evaluated.[31]
data flow diagram (DFD)
A graphical representation of the "flow" of data through an information system, modeling its process aspects.[32]
data structure
A particular way of organizing data in a computer so that it can be used efficiently.[33]
debugging
The process of finding and resolving defects that prevent correct operation of computer software or a system.[34]
decompiler
A computer program that takes an executable file as input, and attempts to create a high level source file which can be recompiled successfully.[35]
deployment environment
A computer system in which a computer program or software component is deployed and executed.[36]
Flowgorithm
A graphical authoring tool which allows users to write and execute programs using flowcharts.[37]
hard coding
The software development practice of embedding an input or configuration data directly into the source code of a program or other executable object, instead of obtaining that data from external sources or generating data or formatting in the program itself with the given input.[38]
interpreter
A computer program that directly executes instructions written in a programming or scripting language, without previously compiling them into a machine language program.[39]
Java
A general-purpose computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible.[40]
JavaScript
A high-level, dynamic, weakly typed, object-based, multi-paradigm, and interpreted client-side programming language. It's also one of the three core technologies of World Wide Web content production alongside of HTML and CSS.[41]
logic error
A bug in a program that causes it to operate incorrectly, not to terminate abnormally, but produce unintended or undesired output or other behavior, although it may not immediately be recognized as such.[42]
macro
A rule or pattern that specifies how a certain input sequence (often a sequence of characters) should be mapped to a replacement output sequence (also often a sequence of characters) according to a defined procedure.[43]
machine language
A set of instructions executed directly by a computer's central processing unit (CPU).[44]
maintainability
the ease with which a program can be modified by its present or future developers in order to make improvements.[45]
methodology
The systematic, theoretical analysis of the methods applied to a field of study.[46]
modular programming
A software design technique that emphasizes separating the functionality of a program into independent and interchangeable units.[47]
object-oriented programming (OOP)
A programming paradigm based on the concept of "objects", which may contain data, in the form of fields, often known as attributes; and code, in the form of procedures, often known as methods.[48]
order of operations
A rule used to clarify which procedures should be performed first in a given mathematical expression.[49]
pair programming
An agile software development technique in which two programmers work together at one workstation. One, the driver, writes code while the other, the observer or navigator, reviews each line of code as it is typed in.[50]
Portability
the range of computer hardware and operating system platforms on which the source code of a program can be compiled/interpreted and run.[51]
PHP
A server-side scripting language designed primarily for web development but also used as a general-purpose programming language.[52]
pseudocode
An informal high-level description of the operating principle of a computer program or other algorithm.[53]
program analysis
The process of automatically examining the behavior of computer programs regarding a property such as correctness, robustness, safety and liveness.[54]
programming
Involves activities such as analysis, developing understanding, generating algorithms, verification of requirements of algorithms, and implementation (commonly referred to as coding) of algorithms in a target programming language.[55]
programming language
A formal constructed language designed to communicate instructions to a machine, particularly a computer.[56]
Python
A widely used general-purpose, high-level programming language that emphasizes code readability.[57]
query language
Computer languages used to make queries in databases and information systems.[58]
reliability
An attribute of resiliency and structural solidity.[59]
robustness
ability of a system to resist change without adapting its initial stable configuration.[60]
run time
The time during which a program is running (executing).[61]
sandbox
A testing environment that isolates untested code changes and outright experimentation from the production environment or repository.[62]
scripting language
A programming language that supports programs written for a special run-time environment that can interpret (rather than compile) and automate the execution of tasks that could alternatively be executed one-by-one by a human operator.[63]
software development
The computer programming, documenting, testing, and bug fixing involved in creating and maintaining applications and frameworks involved in a software release life cycle and resulting in a software product.[64]
source code
Any collection of computer instructions (possibly with comments) written using some human-readable computer language, usually as text.[65]
Spaghetti Code
is a pejorative phrase for unstructured and difficult to maintain source code, broadly construed. Spaghetti code can be caused by several factors, such as volatile project requirements, lack of programming style rules, and insufficient ability or experience.[65]
SQL (Structured Query Language)
A special-purpose programming language designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS).[66]
structured programming
programming paradigm aimed at improving the clarity, quality, and development time of a computer program by making extensive use of subroutines, block structures, for and while loops—in contrast to using simple tests and jumps such as the go to statement which could lead to "spaghetti code" causing difficulty to both follow and maintain.[67]
subroutine
A sequence of program instructions that perform a specific task, packaged as a unit.[68]
syntax error
An error in the sequence of characters or tokens that is intended to be written in a particular programming language.[69]
systems development life cycle (SDLC)
A term used to describe a process for planning, creating, testing, and deploying an information system. The concept applies to a range of hardware and software configurations, as a system can be composed of hardware only, software only, or a combination of both.[70]
usability
The ease with which a person can use the program for its intended purpose.[71]
variable
A storage location paired with an associated symbolic name (an identifier), which contains some known or unknown quantity of information referred to as a value.[72]
visual programming language (VPL)
Any programming language that lets users create programs by manipulating program elements graphically rather than by specifying them textually. A VPL allows programming with visual expressions, spatial arrangements of text and graphic symbols, used either as elements of syntax or secondary notation.[73]
Computer programming is a process that leads from an original formulation of a computing problem to executable computer programs.
Programming involves activities such as _____.
Programming involves activities such as analysis, developing understanding, generating algorithms, verification of requirements of algorithms, and implementation (commonly referred to as coding) of algorithms in a target programming language.
Source code is written in one or more programming languages. Popular programming languages include _____.
Source code is written in one or more programming languages. Popular programming languages include Java, C, C++, C#, and Python.
Programming quality is measured by _____.
Programming quality is measured by reliability, robustness, usability, portability, maintainability, and efficiency.
Reliability is _____.
Reliability is how often the results of a program are correct.
Robustness is _____.
Robustness is how well a program anticipates problems due to errors (not bugs).
Usability is _____.
Usability is the ease with which a person can use the program for its intended purpose.
Portability is _____.
Portability is the range of computer hardware and operating system platforms on which the source code of a program can be compiled/interpreted and run.
Maintainability is _____.
Maintainability is the ease with which a program can be modified by its present or future developers in order to make improvements.
Efficiency is _____.
Efficiency is the amount of system resources a program consumes.
Most programming languages follow the order of operations commonly used in mathematics of _____.
Most programming languages follow the order of operations commonly used in mathematics of Parentheses, Exponents, Multiplication, Division, Addition, and Subtraction, or PEMDAS.
Object-oriented programming (OOP) is _____.
Object-oriented programming (OOP) is a programming paradigm based on the concept of "objects", which are data structures that contain data, in the form of fields, often known as attributes; and code, in the form of procedures, often known as methods.
Most popular object-oriented programming languages are class-based, meaning _____.
Most popular object-oriented programming languages are class-based, meaning that objects are instances of classes, which typically also determines their type.
Popular object-oriented programming languages include _____.
Popular object-oriented programming languages include Java, C++, C#, and Python.
Structured programming is _____.
Structured programming is a programming paradigm aimed at improving the clarity, quality, and development time of a computer program by making extensive use of subroutines, block structures and for and while loops—in contrast to using simple tests and jumps such as the goto statement which could lead to "spaghetti code", which is difficult both to follow and to maintain.
Structured programming uses three control structures — _____, _____, and _____ — to define any program or function.
Structured programming uses three control structures — sequencing, selection (conditions), and iteration (loops) — to define any program or function.
Structured query language (SQL) is_____
Structured query language (SQL)is a domain-specific language used in programming and designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS).
A data type is _____.
A data type is a classification identifying one of various types of data, such as integer, floating-point number, Boolean, character, or string, that determines the possible values for that type; the operations that can be done on values of that type; the meaning of the data; and the way values of that type are stored.
At the machine level, data types correspond to _____.
At the machine level, data types correspond to the sizes of system memory locations and processor data containers (registers) and supporting instructions.
Data types may be combined into _____.
Data types may be combined into composite data types such as arrays and structures.
A computer file is _____.
A computer file is a resource for storing information, which is available to a computer program and is usually based on some kind of durable storage.
Databases are organized collections of data typically collected by schemas, tables, queries, reports and views. Databases are typically organized to process data to provide quick information retrieval.[1]
Review QCI: Database vs. Spreadsheet and PC Magazine: Spreadsheet Does Not = Database. Identify spreadsheets you use at work, school, or home that should be implemented as databases instead. If you are responsible for the data, try creating a database as a replacement. If someone else is responsible for the data, discuss with them the advantages of using a database.
Identify different database management systems that you frequently use. Identify potential benefits and limitations of information stored in those systems.
Research the various levels of security used to protect database management systems.
A database is an organized collection of data, including schemas, tables, queries, reports, views and other objects.[3]
A database management system (DBMS) is a computer software application that interacts with the user, other applications, and the database itself to capture and analyze data. It allows you to keep accurate records and retrieve records quickly.[4]
A general-purpose DBMS is designed to allow the definition, creation, querying, update, and administration of databases.[5]
Because of the close relationship between them, the term "database" is often used casually to refer to both a database and the DBMS used to manipulate it.[6]
A data warehouse is a central repository of integrated data from one or more disparate sources used for reporting and data analysis.[7]
Data mining is the computational process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems.[8]
A relational database management system (RDBMS) is a database management system (DBMS) that is based on the relational model.[9] The relational model represents data terms of ordered sets of elements (tuples), grouped into relations (tables).[10][11]
A hierarchical database model is a data model in which the data is organized into a tree-like structure. The data is stored as records which are connected to one another through links. A record is a collection of fields, with each field containing only one value. The entity type of a record defines which fields the record contains.[12]
An object database is a database management system in which information is represented in the form of objects as used in object-oriented programming.[13]
The network model is a database model conceived as a flexible way of representing objects and their relationships. Its distinguishing feature is that the schema, viewed as a graph in which object types are nodes and relationship types are arcs, is not restricted to being a hierarchy or lattice.[14]
Network databases create multiple linkages between sets by placing links, or pointers, to one set of records in another; the speed and versatility of network databases have led to their wide use within businesses and in e-commerce.[15]
Data migration is the process of transferring data between computer storage types or file formats. It occurs for a variety of reasons, including server or storage equipment replacements, maintenance or upgrades, application migration, website consolidation and data center relocation.[16]
Data warehouses (known as DW, DWH, and EDW) are systems used for reporting and data analysis. Current and historical data uploaded from the operational systems in stored in one single place and is used for creating analytical reports.[17].
A database that is located, stored, and maintained in a single location.[18]
client / server
A distributed application structure that partitions tasks or workloads between the providers of a resource or service and service requesters.[19]
data cleansing
The process of detecting and correcting or removing corrupt or inaccurate records from a record set, table, or database.[20]
data mining
The computational process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems.[21]
data security
protecting data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users.[22]
data validation
The process of ensuring that a program operates on clean, correct and useful data.[23]
data warehouse
A central repository of integrated data from one or more disparate sources used for reporting and data analysis.[24]
database administrator (DBA)
The role responsible for installation, configuration, design, migration, capacity planning, performance monitoring, security, troubleshooting, as well as backup and recovery of a database or databases.[25]
database management system(DBMS)
software for creating and managing databases[source?]
database model
Determines the logical structure of a database and fundamentally determines in which manner data can be stored, organized, and manipulated.[26]
database storage
The container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture.[27]
database schema
The structure of a database described in a formal language supported by the database management system.[28]
digital obsolescence
A situation where a digital resource is no longer readable because of its archaic format.[29]
distributed database
A database in which portions of the database are stored on multiple computers within a network.[30]
export
The act or process of retrieving data out of data sources for further data processing or data storage (data migration).[31]
field
A column or attribute of a record in a relational database.[32]
geographical information system (GIS)
A system designed to capture, store, manipulate, analyze, manage, and present all types of spatial or geographical data.[33]
hierarchical database
A data model in which the data is organized into a tree-like structure.[34]
import
The act or process of loading data into a data source.[35]
join (SQL)
combines columns from one or more tables in a relational database.[36]
migration
The process of transferring data between storage types, formats, or computer systems.[37]
multidimensional database
A database which uses aggregated, inter-related arrays to organize data and express the relationships between data and is used for online analytical processing.[38]
network model
A database model conceived as a flexible way of representing objects and their relationships.[39]
object oriented database
A database management system in which information is represented in the form of combinations of variables, functions, and data structures.[40][41]
NoSQL
(Originally referring to "non SQL" or "non relational") database provides a mechanism for storage and retrieval of data that is modeled in means other than the tabular relations used in relational databases. [42]
query
A precise request for information retrieval with database and information systems.[43]
record
A row or collection of attributes in a relational database.[44]
relation (database)
A set of tuples (d1, d2, ..., dn), where each element dj is a member of Dj, a data domain.[45]
structured query language (SQL)
A special-purpose programming language designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS).[46]
table
A collection of related data held in a structured format within a database.[47]
A database is an organized collection of data, including schemas, tables, queries, reports, views and other objects.
A database management system (DBMS) is a computer software application that _____.
A database management system (DBMS) is a computer software application that interacts with the user, other applications, and the database itself to capture and analyze data.
A general-purpose DBMS is designed to allow _____.
A general-purpose DBMS is designed to allow the definition, creation, querying, update, and administration of databases.
Because of the close relationship between them, the term "database" is often used casually to refer to _____.
Because of the close relationship between them, the term "database" is often used casually to refer to both a database and the DBMS used to manipulate it.
A relational database management system (RDBMS) is a database management system (DBMS) that ______. The ______ represents _____.
A relational database management system (RDBMS) is a database management system (DBMS) that is based on the relational model. The relational model represents data terms of ordered sets of elements (tuples), grouped into relations (tables).
A hierarchical database model is a data model in which the data is organized into _____. The data is stored as ______.
A hierarchical database model is a data model in which the data is organized into a tree-like structure. The data is stored as records which are connected to one another through links.
A record is a collection of ______. The ______ type of a record defines which fields the record contains.
A record is a collection of fields, with each field containing only one value. The entity type of a record defines which fields the record contains.
The network model is a _____ model conceived as a ______. Its distinguishing feature is that the _____, viewed as a graph in which object types are nodes and relationship types are arcs, is not restricted to being a _____ or a _______.
The network model is a database model conceived as a flexible way of representing objects and their relationships. Its distinguishing feature is that the schema, viewed as a graph in which object types are nodes and relationship types are arcs, is not restricted to being a hierarchy or lattice.
Management strategies include _____ and _____ users, enforcing data _____, monitoring _____, maintaining data integrity, dealing with concurrency control, and _____ information that has been _____ by some event such as an unexpected system failure.
Management strategies include registering and monitoring users, enforcing data security, monitoring performance, maintaining data integrity, dealing with concurrency control, and recovering information that has been corrupted by some event such as an unexpected system failure.
A relational database management system (RDBMS) is a database managment system (DMS) that is based on the _____. The _____ represents data terms of ordered sets of _____, grouped into _____.
A relational database management system (RDBMS) is a database management system (DBMS) that is based on the relational model. The relational model represents data terms of ordered sets of elements (tuples), grouped into relations (tables).
Protecting data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users is _____.
Protecting data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users is Data security.
Computing process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems is ____.
Computing process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems is Data mining.
Process that provides certain well-defined guarantees for fitness, accuracy, and consistency for any of various kinds of user input into an application or automated system is ____.
Process that provides certain well-defined guarantees for fitness, accuracy, and consistency for any of various kinds of user input into an application or automated system is Data validation.
The process of transferring data between computer storage types or file formats is ____.
The process of transferring data between computer storage types or file formats is Data migration.
Review Wikipedia: Creative Commons License. Consider the benefits that support the building of a richer public domain when an author wants to give people the right to share, use, and build upon a work that they have created.
Review RIAA:About Piracy. Research legal issues and potential penalties related to illegal peer-to-peer file sharing.
Review the advantages and disadvantages of outsourcing and offshoring. Describe the impact or potential impact of these business practices on your organization.
Review the advantages and disadvantages of Intellectual property rights. Describe the impact or potential impact of these business practices on your organization.
Technology impacts society through innovation and improved communication, resulting in both positive and negative consequences.[2]
Intellectual property is a term referring to creations of the intellect for which a monopoly is assigned to designated owners by law.[3]
Intellectual property rights (IPRs) are the protections granted to the creators of IP, and include trademarks, copyright, patents, industrial design rights, and in some jurisdictions trade secrets. Artistic works including music and literature, as well as discoveries, inventions, words, phrases, symbols, and designs can all be protected as intellectual property.[4]
Intellectual Property law's main purpose is to encourage the creation of a wide variety of intellectual goods[5]
The stated objective of most intellectual property law (with the exception of trademarks) is to "Promote progress." By exchanging limited exclusive rights for disclosure of inventions and creative works, society and the patent/copyright owner mutually benefit, and an incentive is created for inventors and authors to create and disclose their work.[6]
Violation of intellectual property rights, called "infringement" with respect to patents, copyright, and trademarks, and "misappropriation" with respect to trade secrets, may be a breach of civil law or criminal law, depending on the type of intellectual property involved, jurisdiction, and the nature of the action.[7]
Copyrights are there to protect individuals' work, such as literature, art and music. Trademarks are words, phrases, symbols, designs, or a combination of these that are used as an identifier in order to help consumers identify and distinguish one product/service from another one which might be similar. Patents are similar to copyrights and trademarks but protect a person's invention rather than their literary accomplishments or company logos.[8]
Ergonomics is the scientific discipline concerned with the understanding of interactions among humans and other elements of a system, and the profession that applies theory, principles, data and methods to design in order to optimize human well-being and overall system performance.[9]
Computer ergonomics are important because, believe it or not, working at a computer for prolonged periods of time can actually be harmful to your overall health.[10]
Light ergonomics is the relationship between the light source and the individual.[11]
Telecommuting, remote work, or telework is a work arrangement in which employees do not commute to a central place of work, but instead work from home or use mobile telecommunications technology to work from coffee shops or other locations.[12]
A virtual team usually refers to a group of individuals who work together from different geographic locations and rely on communication technology such as email, FAX, and video or voice conferencing services in order to collaborate.[13]
Professional certifications in computer technology are non-degree awards made to those who have achieved qualifications specified by a certifying authority to establish that an individual holding a certification is technically qualified to hold certain positions within the field.[14]
A social networking service is a platform to build social networks or social relations among people who share interests, activities, backgrounds or real-life connections.[15]
Social networking sites allow users to share ideas, pictures, posts, activities, events, and interests with people in their network.[16]
Open-source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose.[17]
The open-source software development, or collaborative development from multiple independent sources, generates an increasingly more diverse scope of design perspective than any one company is capable of developing and sustaining long term.[18]
Web 2.0 describes World Wide Web websites that emphasize user-generated content, usability (ease of use, even by non-experts), and interoperability (this means that a website can work well with other products, systems and devices) for end users.[19]
Privacy concerns with social networking services is a subset of data privacy, involving the right of mandating personal privacy concerning storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via the Internet.[20]
Information technology outsourcing is a company's outsourcing of computer or Internet related work, such as programming, to other companies. It is used in reference to business process outsourcing or BPO, which is the outsourcing of the work that does not require much of technical skills.[21]
A type of deceptive activity where a person creates a sock puppet social networking presence, or fake identity on a social network account, for attention seeking, bullying or as a romance scam.[22]
computer-based training (CBT)
The effective use of computers in learning through educational technology.[23]
computer ethics
A part of practical philosophy which concerns with how computing professionals should make decisions regarding professional and social conduct.[24]
copyleft
The practice of offering people the right to freely distribute copies and modified versions of a work with the stipulation that the same rights be preserved in derivative works down the line.[25]
copyright
A legal right created by the law of a country that grants the creator of an original work exclusive rights for its use and distribution.[26]
copyright infringement (piracy, theft)
The use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works.[27]
cyberbullying
The act of harming or harassing via information technology networks in a repeated and deliberate manner.[28]
cybercrime
Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.[29]
cyberstalking
The use of the Internet or other electronic means to stalk or harass an individual, a group, or an organization.[30]
Digital Millennium Copyright Act
A United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO).[31]
digital rights management (DRM) software
Software used to protect and manage the rights of creators of digital content, such as art, music, photographs, and movies.[32]
digital watermark
A subtle alteration of digital content that is not noticeable when the work is viewed or played but that identifies the copyright holder.[33]
job design
The application of sociotechnical systems principles and techniques to the humanization of work[34]
e-learning
A learning environment which uses information and communication technologies as a platform for teaching and learning activities.[35]
ergonomics
ergonomicsThe practice of designing products, systems or processes to take proper account of the interaction between them and the people who use them.[36]
ethics
moral principles that govern a person's behavior or the conducting of an activity.[37]
fair use
A doctrine originating in the law of the United States that permits limited use of copyrighted material without having to first acquire permission from the copyright holder.[38]
facial recognition system
A technology capable of identifying or verifying a person from a digital image or a video frame from a video source.[39]
forum
An online discussion site where people can hold conversations in the form of posted messages.[40]
globalization
The process of international integration arising from the interchange of world views, products, ideas, and other aspects of culture.[41]
hashtag (#)
A type of label or metadata tag used on social network and microblogging services which makes it easier for users to find messages with a specific theme or content.[42]
industrial design rights
An intellectual property right that protects the visual design of objects that are not purely utilitarian. An industrial design consists of the creation of a shape, configuration or composition of pattern or color, or combination of pattern and color in three-dimensional form containing aesthetic value.[43]
insourcing
The commencement of performing a business function that could be contracted out internally.[44]
instant messaging
A type of online chat which offers real-time text transmission over the Internet.[45]
intellectual property rights
The legal rights to which creators of original creative works (such as artistic or literary works, inventions, corporate logos, and more) are entitled.[46]
license
An official permission or permit to do, use, or own something (as well as the document of that permission or permit).[47]
Luddite
One opposed to industrialization, automation, computerization or new technologies in general.[48]
lurker
A member of an online community who observes, but does not actively participate.[49]
media psychology
The branch of psychology that focuses on the relationships between human behavior and the media.[50]
Massive Open Online Course (MOOC)
An online course aimed at unlimited participation and open access via the web.[51]
new media
Refers to content available on-demand through the Internet, accessible on any digital device, usually containing interactive user feedback and creative participation.[52]
online chat
Any kind of communication over the Internet that offers a real-time transmission of text messages from sender to receiver.[53]
online learning community
Public or private destination on the Internet that addresses the learning needs of its members by facilitating peer-to-peer learning.[54]
open-source software
Computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose.[55]
outsourcing
The contracting out of a business process to another party.[56]
patent
A set of exclusive rights granted by a sovereign state to an inventor or assignee for a limited period of time in exchange for detailed public disclosure of an invention.[57]
patent infringement
The commission of a prohibited act with respect to a patented invention without permission from the patent holder. Permission may typically be granted in the form of a license.[58]
phishing
The attempt to obtain sensitive information such as user names, passwords, and credit card details, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.[59]
plagiarism
The "wrongful appropriation" and "stealing and publication" of another author's "language, thoughts, ideas, or expressions" and the representation of them as one's own original work.[60]
right to privacy
A human right and an element of various legal traditions which may restrain both government and private party action that threatens the privacy of individuals.[61]
social media
Computer-mediated tools that allow people, companies and other organizations to create, share, or exchange information, career interests, ideas, and pictures/videos in virtual communities and networks. [62]
social networking service
A social networking service (also social networking site, SNS or social media) is an online platform that is used by people to build social networks or social relations with other people who share similar personal or career interests, activities, backgrounds or real-life connections.[63]
technology integration
The use of technology tools in general content areas in education in order to allow students to apply computer and technology skills to learning and problem-solving.[64]
technophobia
The fear or dislike of advanced technology or complex devices, especially computers.[65]
telecommuting
A work arrangement in which employees do not commute to a central place of work.[66]
trademark (trade mark, trade-mark)
Trademark symbolA recognizable sign, design, or expression which identifies products or services of a particular source from those of others, although trademarks used to identify services are usually called service marks. The trademark owner can be an individual, business organization, or any legal entity.[67]
trademark infringement
A violation of the exclusive rights attached to a trademark without the authorization of the trademark owner or any licensees (provided that such authorization was within the scope of the licence).[68]
trade secret
A formula, practice, process, design, instrument, pattern, commercial method, or compilation of information not generally known or reasonably ascertainable by others by which a business can obtain an economic advantage over competitors or customers.[69]
trolling
Sowing discord on the Internet by starting arguments or upsetting people, by posting inflammatory, extraneous, or off-topic messages with the deliberate intent of provoking readers into an emotional response or of otherwise disrupting normal on-topic discussion.[70]
Web 2.0
The World Wide Web websites that emphasize user-generated content, usability (ease of use, even by non-experts), and interoperability (this means that a website can work well with other products, systems, and devices) for end users. [71]
virtual team
Refers to a group of individuals who work together from different geographic locations and rely on communication technology such as email, FAX, and video or voice conferencing services in order to collaborate.[72]
World Intellectual Property Organization (WIPO)
One of the 17 specialized agencies of the United Nations. WIPO was created in 1967 "to encourage creative activity, to promote the protection of intellectual property throughout the world".[73]
Technology impacts society through innovation and improved communication, resulting in both positive and negative consequences.
Intellectual property is _____.
Intellectual property is a term referring to creations of the mind such as inventions, names symbols, and images used in commerce.
Some common types of intellectual property rights are _____.
Some common types of intellectual property rights are copyright, patents, and industrial design rights; and the rights that protect trademarks, trade dress, and in some jurisdictions trade secrets: all these cover music, literature, and other artistic works; discoveries and inventions; and words, phrases, symbols, and designs.
Ergonomics is _____.
Ergonomics is the scientific discipline concerned with the understanding of interactions among humans and other elements of a system, and the profession that applies theory, principles, data and methods to design in order to optimize human well-being and overall system performance.
Telecommuting, remote work, or telework is _____.
Telecommuting, remote work, or telework is a work arrangement in which employees do not commute to a central place of work, but instead work from home or use mobile telecommunications technology to work from coffee shops or other locations.
Professional certifications in computer technology are _____.
Professional certifications in computer technology are non-degree awards made to those who have achieved qualifications specified by a certifying authority to establish that an individual holding a certification is technically qualified to hold certain positions within the field.
A social networking service is _____.
A social networking service is a platform to build social networks or social relations among people who share interests, activities, backgrounds or real-life connections.
Social networking sites allow users to _____.
Social networking sites allow users to share ideas, pictures, posts, activities, events, and interests with people in their network.
Open-source software is _____.
Open-source software is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose.
Copy right is ____.
Copy right is a legal right created by the law of a country that grants the creator of an original work exclusive rights for its use and distribution.
Web 2.0 describes _____.
Web 2.0 describes World Wide Web websites that emphasize user-generated content, usability (ease of use, even by non-experts), and interoperability (this means that a website can work well with other products, systems and devices) for end users.
Privacy concerns with social networking services is _____.
Privacy concerns with social networking services is a subset of data privacy, involving the right of mandating personal privacy concerning storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via the Internet.
Information technology outsourcing _____.
Information technology outsourcing is a company's outsourcing of computer or Internet related work, such as programming, to other companies.
Virtual team refers to _____.
Virtual team refers to a group of individuals who work together from different geographic locations and rely on communication technology such as email, FAX, and video or voice conferencing services in order to collaborate.