Cheat Sheet
(Most Know Terms and Information)
Server manages network resources;
software access; centralized storage
Network computers
typically rely on network for storage; no hard drive or CD
Minicomputer up to 4,000 users connected via dumb terminals; can also act as server
Supercomputer - 64 billion instructions/second
Hyperlink (link) built in connection to other related web pages.
Uniform Resource Locator (URL) web page unique address. Consists of protocol, domain name, and
sometimes path to specific web page
http:// - (hypertext transfer protocol) communications standard used to transfer
pages on the web
Search engine software program used to find web sites, web pages,
and Internet files.
Control Unit directs & coordinates most of the operations in
a computer
ALU Arithmetic/Logic Unit performs the execution part of the machine cycle; i.e.,
arithmetic, logic, comparison operations.
Machine Cycle Fetch (obtain instruction or data), decode
(translate the instruction into computer language, execute (carrying out
the commands), storing (writing results to memory).
Clock speed the
speed at which processors execute instructions, measured in MHz (megahertz)
one million ticks of system clock, or GHz (gigahertz) one billion ticks.
Zero Insertion Force (ZIF) socket small lever or screw designed to
facilitate the installation and removal of processor chips.
Analog continuous signal to represent data; Digital signal on or off
Binary computer
numbering system that only uses digits 0 and 1. 1=On, 2=Off. Each on/off
digit value is called a bit.
Eight bits = byte.
Volatile/Non-Volatile memory volatile: contents of memory are lost when computer is turned off; non-volatile: not lost when powered off
SIMM and DIMM Single Inline Memory Module pins on opposite side of circuit board are connected; Dual Inline Memory Module pins on opposite side of circuit board are NOT connected.
Cache stores
frequently used instructions and data. Level
1 (primary cache) built directly into processor chip. Level 2 (external cache) consists of
high-speed SRAM chips.
CMOS Complementary Metaloxide Semiconductor memory stores configuration data about
computer (hard drive, monitor, and keyboard types, data and time stamps, and
other startup information required to start computer). Uses battery power.
Universal Serial Bus (USB) - can connect up to 127 different
peripheral devices to one connector.
Devices are daisy-chained together outside the system unit.
SCSI ports - high-speed parallel ports; transfer up to 32 bits at once; daisy-chain
up to 7 devices
IrDA ports transmit data to system unit via infrared
light waves.
Bitmap rows and columns of dots, each dot consisting of data bits. Todays scanners range 30-48 bits.
Pixel single point in
an electronic image
Printer control language (PCL) standard printer language designed to support fonts and layouts.
Postscripts - commonly used in desktop publishing and
graphic art intense colors and graphics.
Track narrow recording band that forms circle on surface of disk. 80 tracks
on floppy;
Sector pie-shaped sections of disk; 512 bytes of data; 18/track; Cluster
2-8 sectors; smallest unit of space used to store data
File Allocation Table (FAT) table used to locate files on disk.
Point of Presence (POP) local phone # for net access
Packet data broken into pieces when client computer sends data over Internet
Routers used to send packets along fastest available path
TCP/IP (transmission control
protocol/internet protocol)
communications protocol used to define packet switching on the Internet;
Tags - html codes that specify how text and other elements display in
browser & where links lead
File Transfer Protocol (FTP) Internet standard for file exchange
Cookies - track
user preferences; shopping; site visits; targets advertising
Kernel responsible for managing memory, files, devices, clock, starting
applications, assigning resources.
Multiprocessing can support 2 or more CPUs running
programs at same time.
Buffer area of memory or storage where data is placed while waiting to be
transferred to I/O device
Paging - swapping items between memory & storage
Thrashing - OS spends too much time paging instead of executing applications
Interrupt Request (IRQ) communications line between device and CPU; most computers have 15
BIOS Basic I/O System
firmware that contains computers startup instructions
Power-On Self Test POST computer self-test to make sure hardware
is connected & operating properly.
Registry file used to store Windows system configuration information
Global Positioning System (GPS) one or more earth-based receivers that accept and analyze signals sent by satellites in order to determine the receivers geographic location.
Internet worldwide collection of networks that links together millions of business, government offices, educational institutions, and individuals via modems, telephone lines, satellites, and other communications devices and media.
Twisted-pair cable consists of one or more twisted pair wires bundled together; each consisting of two separate insulated copper wires that are twisted together.
Coaxial cable consists of a single copper wire surrounded by three layers: an insulting material, a woven or braided metal, and a plastic outer coating.
Fiber-Optic cable consists of dozens or hundreds of thin strands of glass or plastic that use light to transmit signals.
Analog signal consists of a continuous electrical wave.
Digital signal individual electrical pulses that represent the bits grouped together into bytes.
Bandwidth range of frequencies that a transmission medium can carry in a given period of time.
ISDN set of standards for digital transmission of data over analog telephone lines. Provides faster transmission rates than regular telephone lines.
DSL uses broadband to transmit a greater number of bytes on a standard twisted-pair cable.
Repeater device that accepts a signal from a transmission medium, amplifies it, and retransmits it over the medium.
Bridge device that connects two LANs using the same protocol, such as Enthernet.
Gateway combination of hardware and software that connects networks that use different protocols.
Router device that connects multiple networks, including those with differing protocols.
Ethernet LAN protocol that allows personal computers to contend for access to the network.
Token-ring controls access to the network by requiring that a special signal, called a token, is shared or passed among network devices.
Field combination of one or more characters and is the smallest unit of data you can access.
Data type specifies the type of data a field can contain: text, numeric, currency, date, memo, hyperlink, or object.
Record - group of related fields.
Validation process of comparing data to a set of rules or values to determine if the data is accurate. Validity checks: alpha/numeric, completeness, range, consistency, check digit.
DBMS software program or set of programs designed to control access to the database and manage the data resources efficiently.
Data dictionary stores data about each file in the database.
Relational database stores data in tables that consist of rows and columns.
Structured Query Language used by relational databases to manipulate and retrieve data. Includes keywords and rules used to implement relational algebra operations: projection, selection, join operations.
Object item that can contain both data and the activities that read or manipulate the data.
Object-oriented database - based on object-oriented data model and maintains objects.
Database administrator (DBA) responsible for creating and maintaining data dictionary, establishing and monitoring security of database, monitoring database performance,, and implementing and testing backup and recovery procedures.
Database design guidelines accurate, verifiable, timely, organized, meaningful and cost-effective information.
System Development Life Cycle (SDLC) organized set of activities that guides those involved through the development of an information system. Five major phases: planning, analysis, design, implementation, support.
Gantt chart bar chart that uses horizontal bars to represent project phases or activities.
Planning phase of SDLC review project requests, prioritize them, allocate resources, identify project development team.
Analysis phase of SDLC conduct preliminary investigation, perform detailed analysis consisting of study current system, determine users wants and needs, recommend solution.
Design phase of SDLC acquire hardware and software, develop details of information system to be implemented.
Implementation phase develop any necessary programs, install and test new system, train and education users, convert to new system.
Structured walk-through step-by-step review of deliverables. Used throughout entire SDLC.
Program Development Life Cycle (PDLC) set of steps that programmers use to build programs. Consists of six steps: analyze problems, design programs, code programs, test programs, formalize solutions, maintain programs.
Program specification package detailed design specification that includes relationship among programs in a system as well as input, output, processing, and data requirements of each program.
Analyzing phase of PDLC review program specifications, meet with systems analyst and users, identify each programs input, output and processing components.
Designing programs phase of PDLC grouping each programs activities into modules, devising a solution algorithm, or each module, and testing each solution algorithm.
Solution algorithm (or program logic) graphical or written description of step-by-step procedures for a module.
Structure design approach which all program logic is constructed from a combination of three control structures: sequence control structure, selection control structure, repetition control structure.
Design tools help develop program solution algorithm: program flowcharts, Nassi-Schneiderman charts, pseudocode
Coding programs phase of PDLC translating solution algorithm into programming language, entering programming language code into computer
Testing programs phase of PDLC uncover syntax and logic errors by developing test data and debugging.
Formalize solution phase of PDLC review program code, review documentation.
Maintaining programs phase of PDLC correcting errors, adding enhancements.
Low-level language written to run on one particular computer. Machine languages, assembly languages
High-level language - can run on many different types of computers. 3rd-generation, 4th-generation, natural languages.
Encapsulation details of object are hidden from user
Class objects may be part of a larger category of objects. Every object in a class shares similar methods and attributes.
Inheritance concept of lower levels inheriting methods and attributes of higher levels
Script interpreted program that runs on the client; i.e., runs on your computer as opposed to running on a Web server.
Applet usually runs on the client but it is compiled.
Servlet applet that runs on the server.
Multimedia Personal Computer uses specific hardware and software to input, process, and output various types of media.
Developing multimedia applications analysis, design, and production.
Multimedia authoring software allows you to combine text, graphics, sound, animation, and video into an application.
Computer virus segment of program code that implants itself into a computer file and spreads systematically from one file to another.
Boot sector virus replaces the boot program used to start a computer with a modified infected version of the boot program.
File virus attaches itself to or replaces program files then spreads to any file that accesses the infected program.
Trojan horse virus hides within or is designed to look like a legitimate program.
Macro virus uses the macro language of an applications to hide virus code.
Logic bomb computer virus that activates when it detects a certain condition
Time bomb type of logic bomb that activates on a particular date.
Polymorphic virus modifies its program code each time it attaches itself to another program or file.
Stealth virus can infect a program file but still report the size and creation date of the original uninfected program.
Biometric devices authenticates a person requesting access by verifying personal characteristics such as fingerprints, hand size, signature, typing patterns, and retinal or voice patterns.
Encryption process of converting readable data into unreadable characters to prevent unauthorized access.