INSY 2303 Final (Scott Johnson review terms) test questions fully solved & updated
Antivirus software that is specifically designed to detect viruses and protect a computer and files from harm argument In the context of Prolog programming, describes a predicate and is enclosed in parentheses in a Prolog fact. Brainpower Read More Previous Play Next Rewind 10 seconds Move forward 10 seconds Unmute 0:00 / 0:15 Full screen ASCII (American Standard Code for Information Interchange) A code that represents characters as a series of 1s and 0s. Most computers use ASCII code to represent text, making it possible to transfer data between computers. Binary The representation of data using two states, such as off-on or 1-0. Bit The smallest unit of information handled by a computer. A bit is one of two values, either a 0 or a 1. Eight bits constitute a byte, which can represent a letter or a number. Blogs (Web log) A publicly accessible series of posts on the Web. blogoshpere The world of blogs and all their interconnections. Boolean Operators AND OR, and NOT are used to formulate database queries. Byte An 8-bit unit of data that represents a single character. Code One or more statements written as part of a computer program. Common Carrier A person or company, such as Delta Airlines or AT&T, that transports goods or data for the general public. Compiler Software that translates a program written in a high-level language into low-level instructions before the program is executed. Computer Prototypes (P. 532) Cookie A message sent from a Web server to a browser and stored on a user's hard disk, usually containing information about the user. Data Types The characteristics of data that can be entered into a field in a data file; data types include character, numeric, date, logical, and memo. Data Warehouse A collection of information organized for analysis. Decision Table A tabular method for listing rules and specifying the outcomes for various combinations of rules. Declarative Paradigm (pg. 803,804) An approach to the programming process in which a programmer writes a program by specifying a set of statements and rules that define the conditions for solving a problem. disaster recovery plan A step-by-step plan that describes the methods used to secure equipment and data against disasters, and how to recover from fires, floods, and other such events. Disruptive Technologies An invention that changes markets by replacing existing goods or services. Domain name system A large database of unique IP addresses that correspond to domain names. DSS (decision support system) business intelligence systems that help managers develop solutions for specific problems Email Protocols (p. 338-342) Encapsulation An object-oriented technique in which the internal details of an object are "hidden" in order to simplify their use and reuse. Errors (p760) Expert Systems A computer system that incorporates knowledge from human experts, in order to analyze data and produce a recommendation or decision (also called a knowledge-based system). Feature Creep occurs when extra features are added by developers after production File Naming conventions A set of rules, established by the operating system, that must be followed to create a valid file name. Firewall Software or hardware designed to analyze and control incoming and outgoing packets on a network; used to enhance security by filtering out potential intrusion attempts. Graph Database A database model in which data is arranged as nodes and connected by lines (edges) that establish relationships. Hierarchical Database A database model in which record types are arranged as a hierarchy, or tree, of child nodes that can have only one parent node. high-level language A programming language that allows a programmer to write instructions using human-like language. HTML Hypertext Markup Language, a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on World Wide Web pages. HTTP The communications protocol used to transmit Web pages. HTTP:// is an identifier that appears at the beginning of Web URLs (for example, ). intellectual property A legal concept that refers to ownership of intangible information, such as ideas. Internet A global network connecting millions of computers, making it possible to exchange information. IP Internet Protocol IPv6 Internet addresses that are 128-bit IP addresses. Lower-level languages A programming language that requires a programmer to write instructions for specific hardware elements such as the computer processor, registers, and RAM locations.
Written for
- Institution
- UTA INSY 2303
- Course
- UTA INSY 2303
Document information
- Uploaded on
- January 6, 2024
- Number of pages
- 7
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
insy 2303 final scott johnson review terms
Also available in package deal